-
281
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01“…The progress of contemporary technology has rendered information systems essential in our everyday existence, underscoring the crucial necessity to safeguard information security and privacy. In password authentication, the Electronic Personal Synthesis Behaviour (EPSB) heightens the accuracy of authorizing an authenticated user based on three parameters: EPSBERROR, EPSBTime, and EPSBStyle. …”
Get full text
Article -
282
Development of methodology of accounting and control processes in the digital economy
Published 2020-04-01“…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
Get full text
Article -
283
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Published 2014-01-01Get full text
Article -
284
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT
Published 2014-01-01Get full text
Article -
285
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…This engine is based on the principles of Quantum Mechanics, stochastic processes, and a new approach of decentralization for data storage focused on information security. The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
Get full text
Article -
286
-
287
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
Published 2021-01-01“…The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.…”
Get full text
Article -
288
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
Get full text
Article -
289
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01Get full text
Article -
290
Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture
Published 2025-01-01“…The widespread use of the internet, coupled with the increasing production of digital content, has caused significant challenges in information security and manipulation. Deepfake detection has become a critical research topic in both academic and practical domains, as it involves identifying forged elements in artificially generated videos using various deep learning and artificial intelligence techniques. …”
Get full text
Article -
291
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
Get full text
Article -
292
Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas
Published 2025-01-01“…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
Get full text
Article -
293
A Compact High-Gain Coplanar Waveguide-Fed Antenna for Military RADAR Applications
Published 2020-01-01Get full text
Article -
294
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. …”
Get full text
Article -
295
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
296
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
297
Comparative assessment of the state of digitalisation in higher education institutions
Published 2024-09-01“…This methodology encompasses four spheres of digitalisation: management and information security, organisation of the educational process, organisation of extracurricular activities, and profiling. …”
Get full text
Article -
298
Protection of personal data under martial law in Ukraine
Published 2023-09-01“…The conclusions presented in this article can be a valuable source of information for legislators and information security professionals dealing with personal data protection under martial law. …”
Get full text
Article -
299
Processing streams in a monitoring cloud cluster
Published 2020-01-01“…Hadoop web-programming environment is the technological basis for the development of algorithmic and software solutions for the synthesis of monitoring clusters, including information security and information counteraction systems. …”
Get full text
Article -
300