Results 1 to 10 of about 2,352,522 (144)
Security of information systems [PDF]
In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions.
Željko Bjelajac Đ. +1 more
openaire +2 more sources
Reserves of Generating Capacity for Perspective Planning of Development of the Unified Energy System of Russia [PDF]
Determination of reserves of generating capacity is one of the main tasks in planning the future development of electric power systems. There are many problems that affect the rational level of redundancy of generating capacities in Russian power ...
Krupenev Dmitry +4 more
doaj +1 more source
The Comparison of Cybersecurity Datasets
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection
Ahmed Alshaibi +4 more
doaj +1 more source
Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform
A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data.
Mikhail Svetlakov +4 more
doaj +1 more source
Leveraging the Hyperledger Fabric for Enhancing the Efficacy of Clinical Decision Support Systems
Adopting and implementing the Clinical Decision Support System (CDSS) technology is a critical element in an effort to improve national quality initiatives and evidence-based practice at the point of care. CDSS is envisioned to be a potential solution to
Ramya Gangula +4 more
doaj +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways.
Yaroslav Meshcheryakov +4 more
doaj +1 more source
The use of a satellite Internet systems (SIS) makes it possible to effectively support technologies such as the Industrial Internet of Things (IIoT). This technology is especially relevant for oil and gas industry enterprises implementing the development
Igor A. Kalmykov +5 more
doaj +1 more source
Reconstructed 3D foot models can be used for 3D printing and further manufacturing of individual orthopedic shoes, as well as in medical research and for online shoe shopping.
Lev Shilov +6 more
doaj +1 more source
SoSPa: A system of Security design Patterns for systematically engineering secure systems [PDF]
Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with multiple security concerns systematically. Besides, catalogs of security patterns which can address multiple security concerns have not been applied ...
Nguyen, Phu Hong +5 more
openaire +3 more sources

