-
261
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01“…The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. …”
Get full text
Article -
262
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01“…The study will be underpinned by the Information Security Model to ascertain the confidentiality, integrity and availability of the records. …”
Get full text
Article -
263
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“…DNA Digital coding is the most popular form of cryptographic technology, and it is frequently employed to strengthen information security, and the most prevalent constraints of DNA cryptographic schemes feature a high degree of temporal and algor. …”
Get full text
Article -
264
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01“…Therefore, enhancing security awareness to prevent phishing is crucial for both individuals and banks to protect information security and avoid becoming victims of digital crimes such as phishing.…”
Get full text
Article -
265
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
Get full text
Article -
266
A cross-layer approach to message authentication based on sparse representation for wireless body area networks
Published 2017-03-01“…Due to personal privacy, information security is a particularly important issue in wireless body area networks. …”
Get full text
Article -
267
Contracting account audit on social networks
Published 2022-01-01“…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
Get full text
Article -
268
New Generation of Smart Highway: Framework and Insights
Published 2021-01-01“…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
Get full text
Article -
269
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article -
270
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
Get full text
Article -
271
Authenticated encryption mode with blocks skipping
Published 2021-10-01“…Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. …”
Get full text
Article -
272
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01“…Abstract In cybersecurity, anomaly detection in tabular data is essential for ensuring information security. While traditional machine learning and deep learning methods have shown some success, they continue to face significant challenges in terms of generalization. …”
Get full text
Article -
273
Analysis of global experience in creating digital platforms and related risks
Published 2020-10-01“…The following types of digital risks have been considered: information security risks, organized cybercrime risks, reputational risks, legal risks, operational risks and risks of instability of participants’ income. …”
Get full text
Article -
274
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01“…Abstract Information security is essential to ensure security of exchanged sensitive data in resource‐constrained devices (RCDs) because they are used widely in the Internet of things (IoT). …”
Get full text
Article -
275
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01Get full text
Article -
276
Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ
Published 2020-10-01“…The articles, which have been recommended by reviewers for this issue of CSIMQ, present contributions in different aspects of information management in complex systems, namely, implementation of harmful environment monitoring and data transmitting by Internet-of-Things (IoT) systems, analysis of technological and organizational means for mitigating issues related to information security and users’ privacy that can lead to changes in corresponding systems’ processes, organization and infrastructure, as well as assessment of potential benefits that a controlled (i.e. based on the up-to-date information) change process can bring to an enterprise.…”
Get full text
Article -
277
-
278
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01“…We aim to provide relevant stakeholders (manufacturers, asset owners and system integrators), including Chief Information Security Officers, with information on emerging threat groups, attack victims and their locations, the origins of attacks, the tools and types of tools used, and the motivations behind these attacks. …”
Get full text
Article -
279
Detection of network intelligence features with the decision tree model
Published 2022-03-01“…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
Get full text
Article -
280