Search

Your search keyword '"data security"' showing total 197,783 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security"
197,783 results on '"data security"'

Search Results

1. Confidential Computing or Cryptographic Computing?

2. Confidential Container Groups.

3. Elevating Security with Arm CCA.

4. mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility.

5. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

6. Improving Privacy and Security of Telehealth.

7. The Pros and Cons of Regulating Artificial Intelligence.

8. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

9. Digital Payment Issues.

10. HIPAA: A Demand to Modernize Health Legislation

11. Privacy Risks in the Storytelling of Open Government Data: A Study from the Perspective of User Cognitive Reasoning.

12. Secure the Linux system and its files: The ever-watchful Nick Peers discovers how Linux is built from the ground up to help keep you and your data secure

13. Spent Fuel Transportation Cybersecurity in the Energy Sector for Public Health and Safety: Whether you're moving spent fuel rods, military munitions or military equipment, the procedures described are similar for reducing and managing cybersecurity threats

14. Research on Constructing a Railway Data Security Sharing System Based on Blockchain and Privacy Computing

17. Does AI Technology Adoption Affect Auditors’ Decision-Making Capabilities: Evidence from Jordan?

18. A Whispering Widgets and Wireless Wonders Pioneering Change in the World of IoT

22. Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique.

23. A survey on privacy-preserving federated learning against poisoning attacks.

24. Balancing security and contestability in the DMA: the case of app stores.

25. Do not get lost in the cloud: how EU financial institutions could avoid problems with cloud services arising under DORA.

26. An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud.

27. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.

28. Time-limited ownership delegation scheme with revocation security for healthcare.

29. A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing.

30. Ethical implications of blockchain technology in biomedical research.

31. Global trends in digital preservation: Outsourcing versus in-house practices.

32. Blockchain in Enterprise Resource Planning Systems: A Comprehensive Review of Emerging Trends, Challenges, and Future Perspectives.

33. Swarm mutual learning.

34. Architectural Design for Data Security in Cloud-based Big Data Systems.

35. How to conduct successful business process automation projects? An analysis of key factors in the context of robotic process automation.

36. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

37. Applications of blockchain technology in privacy preserving and data security for real time (data) applications.

38. Enhanced mayfly with active elite approach clustering based deep Q learner routing with EBRLWE for IoT-based healthcare monitoring system.

39. Energy-aware multi-attribute trust modal for secure MANET-IoT environment.

40. Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone.

41. High‐contrast QPSK pattern recognition device consisting of a 4×$\times$4 MMI coupler.

42. Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images.

43. A secure and energy-efficient edge computing improved SZ 2.1 hybrid algorithm for handling iot data stream.

44. The Academic Community Early Psychosis Intervention Network: Toward building a novel learning health system across six US states.

45. Enhancing Iris Authentication for Managing Multiple Cancellations: Leveraging Quotient Filters.

46. Trust Conditions and Privacy Perceptions in the Acceptance of Ambient Technologies for Health-Related Purposes.

47. An Application Programming Interface (API) Sensitive Data Identification Method Based on the Federated Large Language Model.

48. A BiGRU Model Based on the DBO Algorithm for Cloud-Edge Communication Networks.

49. Exploring barriers and ethical challenges to medical data sharing: perspectives from Chinese researchers.

50. Dynamic analysis of malicious behavior propagation based on feature selection in software network.

Catalog

Books, media, physical & digital resources