Results 281 to 290 of about 6,779,765 (359)
A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. [PDF]
Laghari AA+7 more
europepmc +1 more source
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. [PDF]
Wu Y, Pang M, Ma J, Ou W, Yue Q, Han W.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency
IEEE Transactions on Services Computing, 2020After several decades of development on cyber security techniques, one clear conclusion can be drawn: no cyber security solution can completely remove the risks faced by the users.
Shaohan Feng+5 more
semanticscholar +1 more source
Ensuring the Integrity of Electronic Health Records, 2020
“PROTECTION” OF SILESIAN HARD COAL MINES BY THE STATE 1980S (ON EXAMPLE HARD COAL MINE “KATOWICE”) During the entire period of the Polish People’s Republic the Polish state security forces conducted surveillance operations of factories and other ...
O. López
semanticscholar +1 more source
“PROTECTION” OF SILESIAN HARD COAL MINES BY THE STATE 1980S (ON EXAMPLE HARD COAL MINE “KATOWICE”) During the entire period of the Polish People’s Republic the Polish state security forces conducted surveillance operations of factories and other ...
O. López
semanticscholar +1 more source
Security by Insurance for Services
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016It is hard to guarantee proper protection in the Service Oriented Architecture (SOA), when a client outsources a part of its business or sends private data to a services provider. Various solutions proposed so far mostly require evidences of proper protection (e.g., source code for verification or execution traces for monitoring), which are to be ...
F Martinelli, A Yautsiukhin
openaire +4 more sources
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns
IEEE Transactions on Services Computing, 2019Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi+3 more
semanticscholar +1 more source