Results 291 to 300 of about 202,881 (332)
Some of the next articles are maybe not open access.

The Rising Tide Of Computational Vulnerability

Delicate Balance: Technics, Culture and Consequences, 1989
Computer evolution brings ever greater benefits, and ever greater danger as well. Emerging are the worm, virus, and otherwise surreptitious softwares. They billiantly expose the current ethics of computer use to intense public scrutiny. They are (obliquely) t he object of research in Artificial Life studies, for they possess some of the attributes of ...
openaire   +1 more source

Vulnerabilities and storage security in cloud computing

2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015
Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution
Mostapha Derfouf   +2 more
openaire   +1 more source

Cloud Computing: Vulnerability and Threat Indications

2019
An innovative approach of providing and delivering resources is the new emerging technology “cloud computing.” The time demands a reduction in expenditure as an end result of financial restrictions, where cloud computing has established productive position and is seeing immense large-scale investment.
Vaishali Singh, S. K. Pandey
openaire   +1 more source

Exploiting Security Vulnerabilities in Intermittent Computing

2018
Energy harvesters have enabled widespread utilization of ultra-low-power devices that operate solely based on the energy harvested from the environment. Due to the unpredictable nature of harvested energy, these devices experience frequent power outages.
Archanaa S. Krishnan, Patrick Schaumont
openaire   +1 more source

Computers in Hospitals, Vulnerability Aspects

1991
With the advancement of medicine the dependency on adequate information supply has gradually increased. In the early days of medicine the patient had only to deal with’his’ doctor who collected the data himself (if any), stored them in his own brain, where also most of his expertise was stored.
openaire   +1 more source

Vulnerabilities in Cloud Computing

2023
Vikas Chaudhary, Sapna Sinha
openaire   +1 more source

Modeling Cloud Computing Threats and Vulnerabilities

2019
Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire   +1 more source

Computer Security Vulnerabilities and Preventive Measures

2020
With the development of economy and the progress of science and technology, computer network has been widely used in every field of development in our country, and effectively promote the coming of China’s social information age. As an open tool, the network is widely used in people’s daily life, but it is also because of this characteristic that the ...
openaire   +1 more source

Molecular imaging in oncology: Current impact and future directions

Ca-A Cancer Journal for Clinicians, 2022
Steven P Rowe, Martin G Pomper
exaly  

Discovering New Vulnerabilities In Computer Systems

2012
Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
openaire   +1 more source

Home - About - Disclaimer - Privacy