Showing 281 - 300 results of 332 for search '"information security"', query time: 0.08s Refine Results
  1. 281

    Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis by Mohanaad Shakir

    Published 2025-02-01
    “…The progress of contemporary technology has rendered information systems essential in our everyday existence, underscoring the crucial necessity to safeguard information security and privacy. In password authentication, the Electronic Personal Synthesis Behaviour (EPSB) heightens the accuracy of authorizing an authenticated user based on three parameters: EPSBERROR, EPSBTime, and EPSBStyle. …”
    Get full text
    Article
  2. 282

    Development of methodology of accounting and control processes in the digital economy by A. V. Bodiako

    Published 2020-04-01
    “…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
    Get full text
    Article
  3. 283
  4. 284
  5. 285

    A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics by Gerardo Iovane, Riccardo Amatore

    Published 2025-01-01
    “…This engine is based on the principles of Quantum Mechanics, stochastic processes, and a new approach of decentralization for data storage focused on information security. The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
    Get full text
    Article
  6. 286
  7. 287

    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map by Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin, Sichun Du

    Published 2021-01-01
    “…The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.…”
    Get full text
    Article
  8. 288

    Blockchain technology in healthcare strengthening: The Nigerian case by Godsave Binlak Wazhi, Nengak Precious Danladi, Sesugh Daniel Terver, Stephen Ebuka Ukaobasi

    Published 2024-12-01
    “…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
    Get full text
    Article
  9. 289
  10. 290

    Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture by Bekir Eray Katı, Ecir Uğur Küçüksille, Güncel Sarıman

    Published 2025-01-01
    “…The widespread use of the internet, coupled with the increasing production of digital content, has caused significant challenges in information security and manipulation. Deepfake detection has become a critical research topic in both academic and practical domains, as it involves identifying forged elements in artificially generated videos using various deep learning and artificial intelligence techniques. …”
    Get full text
    Article
  11. 291

    A Survey on True Random Number Generators Based on Chaos by Fei Yu, Lixiang Li, Qiang Tang, Shuo Cai, Yun Song, Quan Xu

    Published 2019-01-01
    “…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
    Get full text
    Article
  12. 292

    Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas by Rustamova D. F., Mehdiyeva A. M., Mahmudova Z. A., Abdullaev J., Sapaev B.

    Published 2025-01-01
    “…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
    Get full text
    Article
  13. 293
  14. 294

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. …”
    Get full text
    Article
  15. 295
  16. 296

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. …”
    Get full text
    Article
  17. 297

    Comparative assessment of the state of digitalisation in higher education institutions by N. I. Aksenova, O. V. Usacheva, M. K. Chernyakov

    Published 2024-09-01
    “…This methodology encompasses four spheres of digitalisation: management and information security, organisation of the educational process, organisation of extracurricular activities, and profiling. …”
    Get full text
    Article
  18. 298

    Protection of personal data under martial law in Ukraine by V. A. Svitlychnyi

    Published 2023-09-01
    “…The conclusions presented in this article can be a valuable source of information for legislators and information security professionals dealing with personal data protection under martial law. …”
    Get full text
    Article
  19. 299

    Processing streams in a monitoring cloud cluster by Alexey N. Nazarov

    Published 2020-01-01
    “…Hadoop web-programming environment is the technological basis for the development of algorithmic and software solutions for the synthesis of monitoring clusters, including information security and information counteraction systems. …”
    Get full text
    Article
  20. 300