Search

Your search keyword '"data security"' showing total 8,992 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security" Topic computer security Remove constraint Topic: computer security
8,992 results on '"data security"'

Search Results

1. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.

2. Elicitation of security threats and vulnerabilities in Insurance chatbots using STRIDE.

3. E-Health: Security, Privacy, and Ethics Requirements from a National Perspective in I. R. Iran.

4. Should We Better Stick to Pen and Paper? An Empirical Investigation on Functionality, Privacy and Data-Security of Physiotherapy Telehealth Applications.

5. Secure data communication in WSHN using EXP-MD5 and DHSK-ECC.

6. A Reliable and Secure Method for Sharing Genomic Data.

7. Controlling my genome with my smartphone: first clinical experiences of the PROMISE system.

8. Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way.

9. [Medical photographs: Time saving and data security thanks to a dedicated application].

10. Clientside Pseudonymization with Trusted Third-Party Using Modern Web Technology.

11. Cybersecurity: The need for data and patient safety with cardiac implantable electronic devices.

12. DICOM imaging watermarking for hiding medical reports.

13. Towards a Stakeholder-Oriented Blockchain-Based Architecture for Electronic Health Records: Design Science Research Study.

14. Application of a Blockchain Platform to Manage and Secure Personal Genomic Data: A Case Study of LifeCODE.ai in China.

15. Improving Speed and Security When Sharing Protected Health Information of Deceased Organ Donors.

16. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud.

17. Data Governance and Stewardship.

18. [Data protection in telemedicine].

19. A Review of Clinical Data Management Systems Used in Clinical Trials.

20. Indirect effect of management support on users' compliance behaviour towards information security policies.

21. Security and Other Ethical Concerns of Instant Messaging in Healthcare.

22. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

23. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

24. Security of electronic medical information and patient privacy: what you need to know.

25. What you see is not what you get in the PDF document format.

26. Elevating Security with Arm CCA.

27. Investigation on the Application of Computer System Reliability and Data Security in GPN Networks.

28. Intelligent Threat Detection—AI-Driven Analysis of Honeypot Data to Counter Cyber Threats.

29. An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme.

30. Digital Forensics in Cyber Security and Its Impact on Developing Countries.

31. Ciberseguridad en servicios de apoyo al médico ocupacional de la ciudad de Lima. Estudio piloto.

32. A critical review of the state of computer security in the health sector.

33. A Hybridized Honey Encryption for Data Security using Residue Number System.

34. Magnets to Adversaries—An Analysis of the Attacks on Public Cloud Servers.

35. To what extent does time perspective predict online security behaviour?

36. Development of Cybersecurity Competency and Professional Talent for Cyber Ummah.

37. Context-Based Support to Enhance Developers' Learning of Software Security.

38. Sec-Health: A Blockchain-Based Protocol for Securing Health Records

39. GENIUS TIPS.

40. Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture.

41. Project Spaceman: early British computer security and automatic data processing.

42. A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning.

43. Adaptive Security for Self-Protection of Mobile Computing Devices.

45. A blockchain-based hybrid platform for multimedia data processing in IoT-Healthcare.

46. SECURE STEGANOGRAPHIC DATA TRANSMISSION METHOD FOR PERIODICALLY UPDATED DATA.

47. Cybersecurity of information systems at the National Archives and Records Service of South Africa.

49. Exact Outage Analysis for Non-regenerative Secure Cooperation Against Double-tap Eavesdropping.

50. Quantum cryptography and security analysis.

Catalog

Books, media, physical & digital resources