Search

Your search keyword '"*DATABASE security"' showing total 581 results

Search Constraints

Start Over You searched for: Descriptor "*DATABASE security" Remove constraint Descriptor: "*DATABASE security"
581 results on '"*DATABASE security"'

Search Results

1. Secure shortest distance queries over encrypted graph in cloud computing.

2. Data security and data transmission delay trade-offs inhealthcare blockchain techniques.

3. Observations on big data concerning storage and security management.

4. Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks.

5. Femicide in Mexico: Statistical evidence of an increasing trend.

6. Description and Analysis of Data Security Based on Differential Privacy in Enterprise Power Systems.

7. Trust based access control with hybrid cryptographic algorithm based data security on cloud for e-learning application.

8. Analysing potential data security losses in organisations based on subsequent users logins.

9. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique.

10. ISDA-BAN: interoperability and security based data authentication scheme for body area network.

11. Design and implementation of vehicle security module using touch key and RFID.

12. Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL.

13. Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases.

14. Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC.

15. Research to Identify Factors Influencing the Country's Energy Security Based on Text Data Mining Technology.

16. Enhancement datagram transport layer security protocol based on BB84 protocol in the internet of things.

17. Aes Based Blood Bank System Using Cloud Techniques.

18. Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security.

19. Underestimating attacks: comparing two sources of publicly-available data about attacks on health care in 2017.

20. Quantum private information retrieval over a collective noisy channel.

21. An empirical analysis of vulnerability information disclosure impact on patch R&D of software vendors.

22. DATABASE SECURITY IN RDF TERMS.

23. Application of the Polynomial Function in the Analysis of Statistical Indicators of Risk and Safety in Shipping.

24. Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining.

25. A guiding framework for enhancing database security in state-owned universities in Zimbabwe.

26. Real-Time Energy Data Acquisition, Anomaly Detection, and Monitoring System: Implementation of a Secured, Robust, and Integrated Global IIoT Infrastructure with Edge and Cloud AI.

27. Count vectorizer model based web application vulnerability detection using artificial intelligence approach.

28. 利用哈尔变换和高斯随机数进行矢量空间数据 坐标加密.

29. Formatting European security integration through database interoperability.

30. Efficient big data security analysis on HDFS based on combination of clustering and data perturbation algorithm using health care database.

31. Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations.

32. A proposed model for text and image encryption using different techniques.

33. Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage.

34. Last-use opacity: a strong safety property for transactional memory with prerelease support.

35. Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud.

36. Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems.

37. Understanding Database Reconstruction Attacks on Public Data.

38. Prevalence of anti-hypertensive drug prescription in Thailand, a cross sectional study using National Health Security Office database.

39. An ontology-based secure design framework for graph-based databases.

40. Metodologías más usadas en la seguridad de bases de datos: Una revisión de la literatura científica, 2016-2021.

41. Fixing State Vision: Interoperability, Biometrics, and Identity Management in the EU.

42. Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources.

43. Optimizing CNN-LSTM neural networks with PSO for anomalous query access control.

44. Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.

45. OJS Security Analysis: Issues, Reasons, and Possible Solutions.

46. Private Set Operations Over Encrypted Cloud Dataset and Applications.

47. A Review of Database Security Concepts, Risks, and Problems.

48. Integrity protection method for trusted data of IoT nodes based on transfer learning.

49. Protecting the 2020 Census: A new framework is being used to secure the 2020 U.S. Census from database reconstruction attacks.

50. Secure banking transaction using Blockchain.

Catalog

Books, media, physical & digital resources