Results 291 to 300 of about 202,881 (332)
Some of the next articles are maybe not open access.
The Rising Tide Of Computational Vulnerability
Delicate Balance: Technics, Culture and Consequences, 1989Computer evolution brings ever greater benefits, and ever greater danger as well. Emerging are the worm, virus, and otherwise surreptitious softwares. They billiantly expose the current ethics of computer use to intense public scrutiny. They are (obliquely) t he object of research in Artificial Life studies, for they possess some of the attributes of ...
openaire +1 more source
Vulnerabilities and storage security in cloud computing
2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution
Mostapha Derfouf +2 more
openaire +1 more source
Cloud Computing: Vulnerability and Threat Indications
2019An innovative approach of providing and delivering resources is the new emerging technology “cloud computing.” The time demands a reduction in expenditure as an end result of financial restrictions, where cloud computing has established productive position and is seeing immense large-scale investment.
Vaishali Singh, S. K. Pandey
openaire +1 more source
Exploiting Security Vulnerabilities in Intermittent Computing
2018Energy harvesters have enabled widespread utilization of ultra-low-power devices that operate solely based on the energy harvested from the environment. Due to the unpredictable nature of harvested energy, these devices experience frequent power outages.
Archanaa S. Krishnan, Patrick Schaumont
openaire +1 more source
Computers in Hospitals, Vulnerability Aspects
1991With the advancement of medicine the dependency on adequate information supply has gradually increased. In the early days of medicine the patient had only to deal with’his’ doctor who collected the data himself (if any), stored them in his own brain, where also most of his expertise was stored.
openaire +1 more source
Modeling Cloud Computing Threats and Vulnerabilities
2019Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire +1 more source
Computer Security Vulnerabilities and Preventive Measures
2020With the development of economy and the progress of science and technology, computer network has been widely used in every field of development in our country, and effectively promote the coming of China’s social information age. As an open tool, the network is widely used in people’s daily life, but it is also because of this characteristic that the ...
openaire +1 more source
Molecular imaging in oncology: Current impact and future directions
Ca-A Cancer Journal for Clinicians, 2022Steven P Rowe, Martin G Pomper
exaly
Discovering New Vulnerabilities In Computer Systems
2012Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
openaire +1 more source

