Results 81 to 90 of about 305,823 (288)

Об'єкти захисту інформації. Методи та засоби захисту інформації [PDF]

open access: yes, 2006
Наведено узагальнюючу схему можливих каналів витоку і несанкціонованого доступу до інформації, оброблюваної в типовому одноповерховому офісі.In the article the author represented generalized scheme of possible ways of leak and unauthorized access to the
Василюк, Володимир
core  

Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics

open access: yesJurnal Telematika, 2020
In this era, free access points are found available in various places. But this freedom comes with a price, and only a few users really understand the risk. In a recent survey, 70% of tablet owners and 53% of smartphone owners stated that they use public wifi hotspots.
Felicia Paramita   +4 more
openaire   +1 more source

Setting up mother–infant pair lactation studies with biobanking for research according to regulatory requirements

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Within the ConcePTION project we set out to design two mother–infant pair studies collecting breast milk and plasma from the mother and plasma from the infant (for metformin and prednisolone) in order to demonstrate the premises and conditions for investigating potential drug transfer in association with breastfeeding.
Mats Hansson   +11 more
wiley   +1 more source

Psychosocial Stressors of Unauthorized and Authorized Latine Immigrants: Psychological Well-Being

open access: yesSocieties
Latine immigrants may experience a heightened degree of stress related to their immigration status. This is particularly true for immigrants who are in the country unauthorized.
Lucila Ramos-Sánchez, Jasmín D. Llamas
doaj   +1 more source

Digital diagnostics, biomarkers and therapeutics in an evolving healthcare system: From promise to practice

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop   +3 more
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2019
Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available ...
V. P. Alferov   +3 more
doaj   +1 more source

Operationalising global education in teacher education and training: A model for contextualising terminology

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Despite a growing international consensus that students need to be provided with the type of education that effectively prepares them to engage in and contribute to their globalised world, and that teachers need to be appropriately trained to facilitate this teaching and learning, ‘global education’ continues to be hindered by a lack of ...
Sarah‐Louise Jones   +2 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Stewardship of very large digital data archives [PDF]

open access: yes
This paper addresses the problems foreseen by the author in stewarding the very large digital data archives that will accumulate during the mission of the Earth Orbiting Satellite (EOS).
Savage, Patric
core   +1 more source

Home - About - Disclaimer - Privacy