Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 14
- Economic development 7
- Entrepreneurship 6
- Psychological tests 6
- Research 6
- Economic policy 5
- English language 5
- History 5
- Study and teaching 5
- Business enterprises 4
- Industrial management 4
- Information Science 4
- Language 4
- Law 4
- Social aspects 4
- Statistics 4
- information technology 4
- Biochemistry 3
- Computer security 3
- Design 3
- Economic conditions 3
- Globalization 3
- Grammar 3
- Information Technology 3
- Information theory 3
- Internet 3
- Management information systems 3
- Mass media 3
- Methodology 3
-
561
THE EFFICIENCY OF UNIVERSITY RANKINGS: IMPLEMENTATION OF INFORMATIONAL AND MOTIVATIONAL FUNCTIONS
Published 2016-12-01Subjects: Get full text
Article -
562
Credit Risk Contagion Based on Asymmetric Information Association
Published 2018-01-01“…In this paper, a credit risk contagion model based on asymmetric information association is proposed. The model can effectively describe the correlation among individuals with credit risk. …”
Get full text
Article -
563
Insight into Hanjiang River Basin Information System Development
Published 2011-01-01Get full text
Article -
564
A non-linear model of information seeking behaviour
Published 2005-01-01Subjects: “…Information seeking behaviour…”
Get full text
Article -
565
Hadoop bottleneck detection algorithm based on information gain
Published 2016-07-01Subjects: Get full text
Article -
566
-
567
The effect of formal and informal communication on managerial satisfaction and performance
Published 2022-11-01“…From this data measures were developed for each manager of (a the frequency of his scheduled (formal) communications, and (b) the frequency of his unscheduled (informal) communications with superiors (upward communication), with peers (horizontal communication) and with subordinates (downward communication). …”
Get full text
Article -
568
Development of the Information Technology Sector in India: the Role of Government
Published 2014-12-01Subjects: Get full text
Article -
569
Emerging Information and Communication Technologies for Traffic Estimation and Control
Published 2018-01-01Get full text
Article -
570
Youtube as a Source of Patient Information for Gummy Smile
Published 2024-08-01“…Videos were analysed to evaluate the and quality and scientific reliability of the information using Global Quality Scale(GQS) and DISCERN criteria; and the understandability of this information using a tailormade custom comprehensiveness index(CI). …”
Get full text
Article -
571
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
572
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
573
Maximizing information in neuron populations for neuromorphic spike encoding
Published 2025-01-01Subjects: Get full text
Article -
574
Solution Scheme for Acquisition of Satellite Positioning Mobile Information
Published 2004-01-01Get full text
Article -
575
Scientific information management in the research education of Medicine students
Published 2009-09-01“…<p>In any scientific research it is very important to achieve an appropriate information management to allow creating and transmitting new knowledge. …”
Get full text
Article -
576
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01Subjects: “…information security management…”
Get full text
Article -
577
Application of information technologies for automation management of environmental activity
Published 2019-12-01Subjects: Get full text
Article -
578
General Idea for Water Resources Information Construction in Guangdong
Published 2002-01-01Get full text
Article -
579
Financial Reporting Quality and Sustainability Information Disclosure in Brazil
Published 2019-01-01“…Currently, businesses face an information disclosure approach involving the triple bottom line (social, environmental, and financial). …”
Get full text
Article -
580
Reputation Detection for Information Diffusion in Social Network Systems
Published 2022-01-01“…The main idea is that the positive (or negative) observation of an information diffusion process increases (or decreases) the belief of the corresponding diffusion path, which further increases (or decreases) the reputation of each involved agent. …”
Get full text
Article