Showing 301 - 320 results of 332 for search '"information security"', query time: 0.08s Refine Results
  1. 301

    APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS by Yurii V. Shchavinsky, Tetiana M. Muzhanova, Yuriy M. Yakymenko, Mykhailo M. Zaporozhchenko

    Published 2023-10-01
    “…The analysis conducted in this work allowed us to conclude the need for improvement of the situational teaching method as one of the main ways to develop the competencies of students majoring in Cybersecurity and Information Security in higher education institutions. One of the ways to improve the method is to use artificial intelligence tools in creating various types of tasks for classes. …”
    Get full text
    Article
  2. 302

    Long-Term Monitoring of Individuals With Chronic Obstructive Pulmonary Disease Using Digital Health Technology: Qualitative Study by Shih-Ying Chien, Han-Chung Hu, Hsiu-Ying Cho

    Published 2025-02-01
    “…By addressing identified barriers and capitalizing on facilitators, advancements can be made in the development and use of DHT, especially in overcoming challenges such as information security and operational methods. The implementation of the recommended strategies will likely lead to improved COPD care outcomes.…”
    Get full text
    Article
  3. 303

    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method by Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Muhammad Ramzan Saeed

    Published 2022-01-01
    “…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
    Get full text
    Article
  4. 304

    Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection by Musaib Rafiq, Yogesh Singh Chauhan, Shubham Sahay

    Published 2024-01-01
    “…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
    Get full text
    Article
  5. 305
  6. 306
  7. 307

    Formation of Russian magistracy: implementation of the digital economy requests in the educational process by E. V. Voevodina

    Published 2020-02-01
    “…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
    Get full text
    Article
  8. 308

    Modern trends and conceptual approaches to understanding the essence of the concept of “national security” by Yu. O. Zahumenna

    Published 2022-12-01
    “…More specific varieties of the legal definition of “security”, which correlate with it as “general” and “special” categories, are the concepts of “national security”, “state security”, “public security”, “personal security”, and derivatives from them, such as “military security”, “economic security”, “information security” and other types of security, are allocated in a separate type in numerous scientific works of Ukrainian and foreign specialists depending on the object of protection, the sphere of social relations, and the types of practical activities of various state bodies. …”
    Get full text
    Article
  9. 309
  10. 310

    Implementasi Teknologi Blockchain dengan Sistem Smart Contract pada Klaim Asuransi by Baihaqsani, Ari Kusyanti, Primantara Hari Trisnawan

    Published 2024-10-01
    “…With these problems can cause problems related to information security in the form of data integrity, data confidentiality, and data transparency on insurance claims. …”
    Get full text
    Article
  11. 311

    Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…Accordingly, the specific object of this crime is more narrow range of specific social relations that are associated with ensuring the state of information security. It was formulated as social relations that exist with regard to the security of state secrets and official information gathered in the process of operative and search, counter-intelligence activities, in the field of the country defense. …”
    Get full text
    Article
  12. 312
  13. 313
  14. 314

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
    Get full text
    Article
  15. 315

    Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz, Juan Manuel Madrid Molina

    Published 2025-01-01
    “…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
    Get full text
    Article
  16. 316

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
    Get full text
    Article
  17. 317
  18. 318

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
    Get full text
    Article
  19. 319

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Dengan melakukan serangan menggunakan Autopsy dan Stegspy hanya 3 dari 30 stego image yang dapat dideteksi citra sharesnya, ini baru sebatas citra shares, dan untuk merekonstruksi ulang citra secretnya dibutuhkan sepasang shares, jadi diambil kesimpulan bahwa penggabungan metode ini berhasil mengamankan informasi didalamnya.   Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
    Get full text
    Article
  20. 320

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach by Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, Hussein Al Hashimi, Ismail Keshta

    Published 2025-01-01
    “…The proposed model includes state-of-the-art machine learning with traditional information security paradigms to offer an integrated solution to the emerging complex security issues related to 5G. …”
    Get full text
    Article