Results 81 to 90 of about 305,823 (288)
Об'єкти захисту інформації. Методи та засоби захисту інформації [PDF]
Наведено узагальнюючу схему можливих каналів витоку і несанкціонованого доступу до інформації, оброблюваної в типовому одноповерховому офісі.In the article the author represented generalized scheme of possible ways of leak and unauthorized access to the
Василюк, Володимир
core
Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics
In this era, free access points are found available in various places. But this freedom comes with a price, and only a few users really understand the risk. In a recent survey, 70% of tablet owners and 53% of smartphone owners stated that they use public wifi hotspots.
Felicia Paramita +4 more
openaire +1 more source
Within the ConcePTION project we set out to design two mother–infant pair studies collecting breast milk and plasma from the mother and plasma from the infant (for metformin and prednisolone) in order to demonstrate the premises and conditions for investigating potential drug transfer in association with breastfeeding.
Mats Hansson +11 more
wiley +1 more source
Psychosocial Stressors of Unauthorized and Authorized Latine Immigrants: Psychological Well-Being
Latine immigrants may experience a heightened degree of stress related to their immigration status. This is particularly true for immigrants who are in the country unauthorized.
Lucila Ramos-Sánchez, Jasmín D. Llamas
doaj +1 more source
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop +3 more
wiley +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available ...
V. P. Alferov +3 more
doaj +1 more source
Abstract Despite a growing international consensus that students need to be provided with the type of education that effectively prepares them to engage in and contribute to their globalised world, and that teachers need to be appropriately trained to facilitate this teaching and learning, ‘global education’ continues to be hindered by a lack of ...
Sarah‐Louise Jones +2 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Stewardship of very large digital data archives [PDF]
This paper addresses the problems foreseen by the author in stewarding the very large digital data archives that will accumulate during the mission of the Earth Orbiting Satellite (EOS).
Savage, Patric
core +1 more source

