Buscar
Mostrando ítems 1-10 de 12258
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ...
An Agent-Based Approach for Data Fusion in Homeland Security
This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem ...
Information Security Policy Compliance: Usefulness and Ease of Use
(Springer Link, 2023)
Various information security (IS) standards and frameworks have been proposed with the objective of safeguarding an organization’s information assets. The Information Security Policy (ISP) is one of the tools for managing ...
Novos métodos para prover segurança à comunicação no âmbito de redes elétricas inteligentes
(Universidade Federal de Santa MariaBrasilEngenharia ElétricaUFSMPrograma de Pós-Graduação em Engenharia ElétricaCentro de Tecnologia, 2018-03-23)
Information and communication technologies (ICT) incorporated into the power grid allows
the full implementation of the smart grids (SG) concept. Among the segments of the power
grid, providing this integration to energy ...
Robust Lossless Semi Fragile Information Protection in Images
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the ...
Secure DNA data compression using algebraic curves
(IEEE, 2015)
A system that achieves compression using artificial DNA packaging with the support of two algebraic curves is presented, whereby the Hermitian channel code algorithm introduces gain and safety. Additionally, performance ...
Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services. ...
Analysis of Security Mechanisms Based on Clusters IoT Environments
Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. ...
Comparing topics in CS syllabus with topics in CS research
(Association for Computing Machinery, 2016)
This study quantifies and compares the computer security themes found in the ACM Computer Science curricula with the themes addressed in top-ranked computer security re- search conferences over the past six years. On the ...