Results 51 to 60 of about 2,702,156 (313)

THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2015
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002.
SABAU-POPA CLAUDIA DIANA   +3 more
doaj  

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

open access: yesIEEE Access, 2021
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes.
Lakshmana Kumar Ramasamy   +5 more
doaj   +1 more source

Social networks as an apparatus for managing of information security in the digital economy [PDF]

open access: yesarXiv, 2021
The paper aims to present a new apparatus for managing of the information security of the digital economy with using of social networks. A general problem for optimization of the information security management for participants in the digital economy is formulated.
arxiv  

Music Interventions in Hyperacute and Acute Stroke Patients: A Randomized Controlled Pilot Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher   +7 more
wiley   +1 more source

SIERRA: Ranking Anomalous Activities in Enterprise Networks [PDF]

open access: yesarXiv, 2022
An enterprise today deploys multiple security middleboxes such as firewalls, IDS, IPS, etc. in its network to collect different kinds of events related to threats and attacks. These events are streamed into a SIEM (Security Information and Event Management) system for analysts to investigate and respond quickly with appropriate actions.
arxiv  

Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan   +6 more
wiley   +1 more source

The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2019
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad   +1 more
doaj   +1 more source

Threshold Values of Sleep Spindles Features in Healthy Adults Using Scalp‐EEG and Associations With Sleep Parameters

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho   +8 more
wiley   +1 more source

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

Technical note: Efficient online source identification algorithm for integration within a contamination event management system [PDF]

open access: yesDrinking Water Engineering and Science, 2017
Drinking water distribution networks are part of critical infrastructures and are exposed to a number of different risks. One of them is the risk of unintended or deliberate contamination of the drinking water within the pipe network.
J. Deuerlein, L. Meyer-Harries, N. Guth
doaj   +1 more source

Home - About - Disclaimer - Privacy