Results 1 to 10 of about 2,352,522 (144)

Security of information systems [PDF]

open access: yesPravo - teorija i praksa, 2020
In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions.
Željko Bjelajac Đ.   +1 more
openaire   +2 more sources

Reserves of Generating Capacity for Perspective Planning of Development of the Unified Energy System of Russia [PDF]

open access: yesE3S Web of Conferences, 2020
Determination of reserves of generating capacity is one of the main tasks in planning the future development of electric power systems. There are many problems that affect the rational level of redundancy of generating capacities in Russian power ...
Krupenev Dmitry   +4 more
doaj   +1 more source

The Comparison of Cybersecurity Datasets

open access: yesData, 2022
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection
Ahmed Alshaibi   +4 more
doaj   +1 more source

Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform

open access: yesComputers, 2022
A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data.
Mikhail Svetlakov   +4 more
doaj   +1 more source

Leveraging the Hyperledger Fabric for Enhancing the Efficacy of Clinical Decision Support Systems

open access: yesBlockchain in Healthcare Today, 2021
Adopting and implementing the Clinical Decision Support System (CDSS) technology is a critical element in an effort to improve national quality initiatives and evidence-based practice at the point of care. CDSS is envisioned to be a potential solution to
Ramya Gangula   +4 more
doaj   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices

open access: yesIEEE Access, 2021
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways.
Yaroslav Meshcheryakov   +4 more
doaj   +1 more source

Application of Modular Residue Classes Codes in an Authentication Protocol for Satellite Internet Systems

open access: yesIEEE Access, 2023
The use of a satellite Internet systems (SIS) makes it possible to effectively support technologies such as the Industrial Internet of Things (IIoT). This technology is especially relevant for oil and gas industry enterprises implementing the development
Igor A. Kalmykov   +5 more
doaj   +1 more source

Reconstruction of a 3D Human Foot Shape Model Based on a Video Stream Using Photogrammetry and Deep Neural Networks

open access: yesFuture Internet, 2021
Reconstructed 3D foot models can be used for 3D printing and further manufacturing of individual orthopedic shoes, as well as in medical research and for online shoe shopping.
Lev Shilov   +6 more
doaj   +1 more source

SoSPa: A system of Security design Patterns for systematically engineering secure systems [PDF]

open access: yes2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), 2015
Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with multiple security concerns systematically. Besides, catalogs of security patterns which can address multiple security concerns have not been applied ...
Nguyen, Phu Hong   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy