Skip to main content
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this... more
    • by 
    •   7  
      Information SystemsHealth SciencesInformation SecurityComputer Security
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched,... more
    • by 
    •   4  
      Electronic Health RecordsComputer SecurityComputer communication networksDelivery of Health Care
In Industrial environments, huge amount of data is being generated which in turn collected indatabase anddata warehouses from all involved areas such as planning, process design, materials, assembly, production, quality, process control,... more
    • by 
    •   22  
      BioinformaticsComputer ScienceAlgorithmsComputer Architecture
Internet of Things provides truly ubiquitous and smart environment. The multilayer distributed architecture with a variety of different components together with end devices, applications and the association with its framework poses... more
    • by 
    •   8  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
    • by 
    •   2  
      Information SecurityComputer Security
Self-healing concretes are being widely recognized as a remedial technique to improve the durability o f concrete. Although, few review papers on self-healing concret e were published, a strong review on all aspects of self-healing... more
    • by 
    •   10  
      EngineeringCivil EngineeringInformation SecurityConcrete
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
La présente analyse a pour but d'établir le niveau de risque que représente l'utilisation système de gestion de production SCADA dans l'ABC Energie Portée (scope) : La portée de cette analyse est sur le système de gestion de production... more
    • by 
    •   6  
      Information SecurityComputer SecuritySCADASécurité informatique
The world of internet today has become a parallel form of life and living. Public are now capable of doing things which were not imaginable few years ago. The Internet is fast becoming a way of life for millions of people and also a way... more
    • by 
    •   7  
      Criminal LawInformation SecurityComputer SecurityCyber crime
ࡗ Sponsors high-level conferences and symposia around the world. ࡗ Offers as an open standard (www.isaca.org/cobit) Control Objectives for Information and related Technology (COBIT ® ), a breakthrough IT governance tool that uses... more
    • by 
    •   2  
      Information SecurityComputer Security
ISO is one of the principal publishers of standards in the world with superior than 21000  , covering almost every industry, from technology, to foodstuff safety, to farming and healthcare.
    • by 
    •   6  
      Information SecurityTrainingComputer SecurityIndia
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
    • by 
    •   22  
      Information TechnologyInformation SecuritySecurityDesign Research
Full file at https://testbanku.      Full file at https://testbanku.eu/
    • by 
    •   14  
      Civil EngineeringSoftware EngineeringHealth SciencesPolitical Economy
Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe.      Full file at https://testbanku.eu/
    • by 
    •   4  
      Computer ScienceInformation SecurityCritical PedagogyComputer Security
Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... more
    • by 
    •   8  
      Network SecurityRisk and VulnerabilityComputer SecurityVulnerability
Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in building effective deterrence against them. State and non-state actors continue to act with an unacceptable level of... more
    • by 
    •   2  
      Information SecurityComputer Security
    • by 
    •   4  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
Maestroteca
    • by 
    •   3  
      Computer SecurityData PrivacyElectronic Commerce
The rise of machine-to-machine (M2M) communications (hardware and software) in internet of things (IoT), let local/overseas organizations such as information systems, schools, hospitals/healthcare, libraries, environment, transportation... more
    • by 
    •   3  
      Computer ScienceComputer SecurityInternet of Things
The use of bacteriorhodopsin (BR) as an active layer in write-once-read-many optical storage is presented. This novel feature of BR materials may be used on a wide variety of substrates, among them transparent substrates but also paper... more
    • by 
    •   20  
      OpticsBiomedical EngineeringPhotochemistryComputer Security
Pattern classification systems based on machine learning algorithms are commonly used in securityrelated applications like biometric authentication, network intrusion detection, and spam filtering, to discriminate between a "legitimate"... more
    • by 
    •   9  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in... more
    • by 
    •   3  
      Computer ScienceComputer SecurityComputer Applications
This paper proposes coronavirus disease tracing system acts as a portal for the health center to update and track their patients' contacts and collect data for further analysis. All of the contents are handpicked, filtered, and selected... more
    • by 
    • Computer Security
    • by 
    •   3  
      Computer ScienceInformation SecurityComputer Security
Research in the broader IT context highlights that there are two main sources for vulnerabilities in IT systems. Firstly, there are technical flaws and architectural vulnerabilities that open back-doors into otherwise safe systems.... more
    • by 
    •   5  
      DesignInformation SecurityRequirements EngineeringComputer Security
With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not... more
    • by 
    •   7  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
    • by 
    •   4  
      Computer ScienceInformation SecurityWireless CommunicationsComputer Security
The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed... more
    • by 
    •   3  
      Information SecurityComputer SecurityCryptography
In any organization that operates in cyberspace, it is necessary to understand the information battlespace. Defensive information battlespace knowledge can be provided by detailed analysis of carefully selected metrics using automated... more
    • by 
    •   6  
      Organizational BehaviorComputer ScienceOrganizational CommunicationCase Study Research
The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated... more
    • by 
    •   6  
      Information SystemsInformation SecuritySecurityComputer Security
    • by 
    •   13  
      AustraliaInformed ConsentTreatment OutcomeComputer Security
    • by 
    •   7  
      Computer ScienceInformation SecurityComputer EngineeringWireless Communications
This report focuses on vulnerabilities on web-applications and web-sites from Cross-Site Scripting attacks (XSS). The different types of XSS attacks are examined: DOM-based, active and passive attacks. The spread of XSS attacks across... more
    • by 
    •   4  
      Computer ScienceComputer SecurityWeb Application SecurityCross Site Scripting
NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed... more
    • by 
    •   6  
      Computer ScienceInformation SecurityDatabase SystemsComputer Networks
Data integration is the technique of merging data residing at different sources at different locations, and providing users with an integrated, reconciled view of these data. Such unified view is called global or mediated schema. It... more
    • by 
    •   4  
      Information SecurityComputer SecurityOnline social networksData Integration
The necessity of the companies and organizations to adapt the technological and computer science change takes to formulated key questions: What type of Computer science Security needs my company, financial organization, or government? My... more
    • by 
    •   8  
      BusinessComputer ScienceInformation SecurityNetwork Security
Malware is one of the major security threats that can break computer operation. However, commercial antivirus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. Nowadays malware... more
    • by 
    •   12  
      Computer ScienceComputer ArchitecturePolymorphismComputer Security
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
    • by 
    •   20  
      Computer ScienceComputer ForensicsData AnalysisComputer Security
Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR)... more
    • by 
    •   10  
      Computer ScienceArtificial IntelligenceImage ProcessingInformation Security
Bu yazımı üniversitede aldığım ders notlarımdan oluşturdum. Bilişim Sistemleri Güvenliğine girişi ve yaklaşımları kapsamaktadır.
    • by 
    •   5  
      Information SystemsComputer ScienceInformation SecurityComputer Security
Prezentowany tekst jest zapisem wykładu, jaki wygłosił autor w trakcie uroczystości nadania mu godności doktora honoris causa Uniwersytetu Ekonomicznego w Krakowie (26.05.2008). W wykładzie najpierw zdefiniowano zagrożenia, jakie mogą... more
    • by 
    •   4  
      Computer ScienceCommunicationComputer SecurityRelaibility
    • by 
    •   6  
      Computer ScienceInformation SecurityDatabase SystemsComputer Networks
    • by 
    •   7  
      Computer SciencePhonologyInformation SecurityComputer Engineering
Our Security Agencies to provide the most professional security services available in and around Chennai.Prior to placing our security personnel we ensure he/she is well prepared to handle with real world challenges. visit @... more
    • by 
    •   3  
      Information SecurityComputer SecurityHotel Management
    • by 
    •   98  
      HistoryCultural HistorySociologyPolitical Sociology
Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose... more
    • by 
    •   3  
      Computer ScienceInformation SecurityComputer Security
    • by 
    •   4  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
previous sections, are: scalability with respect to the number of nodes in the network, self-organization, self-healing, energy efficiency, a sufficient degree of connectivity among nodes, low-complexity, low cost and size of nodes. Those... more
    • by 
    •   16  
      Information SystemsComputer ScienceInformation TechnologyInformatics