Search

Your search keyword '"Information security"' showing total 7,232 results

Search Constraints

Start Over You searched for: Descriptor "Information security" Remove constraint Descriptor: "Information security" Publisher ieee Remove constraint Publisher: ieee
7,232 results on '"Information security"'

Search Results

1. Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks

2. A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications

3. A Security-Oriented Overview of Federated Learning Utilizing Layered Reference Model

4. Enhancing Healthcare Imaging Security: Color Secret Sharing Protocol for the Secure Transmission of Medical Images

5. Dual-Stream Intermediate Fusion Network for Image Forgery Localization

6. Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF

7. Automated Knowledge-Based Cybersecurity Risk Assessment of Cyber-Physical Systems

8. Design and Evaluation of Advanced Persistent Threat Scenarios for Cyber Ranges

9. Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection

10. Toward Hybrid Classical Deep Learning-Quantum Methods for Steganalysis

11. Enhancing Copyright Protection Through Blockchain and Ring Signature Algorithm From Lattice

12. A Systematic Literature Review on Host-Based Intrusion Detection Systems

13. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

14. A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review

15. Automated Chaos-Driven S-Box Generation and Analysis Tool for Enhanced Cryptographic Resilience

16. Joint Identification for Number of Transmit Antennas and Channel Order

17. Enhancing Secret Data Detection Using Convolutional Neural Networks With Fuzzy Edge Detection

18. Designing S-Box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map

19. Hardware Implementation of High-Throughput S-Box in AES for Information Security

20. Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing

21. A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends

22. Secure Optical Image Communication Using Double Random Transformation and Memristive Chaos

23. An Intelligent Optimization Control Method for Enterprise Cost Under Blockchain Environment

24. Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective.

25. An Information Security Method Based on Optimized High-Fidelity Reversible Data Hiding.

26. A Comparative Analysis of Information and Artificial Intelligence Toward National Security

27. CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data

28. How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study

29. High-Capacity Image Steganography Based on Discrete Hadamard Transform

30. PRMS: Design and Development of Patients’ E-Healthcare Records Management System for Privacy Preservation in Third Party Cloud Platforms

31. An Attention Mechanism for Combination of CNN and VAE for Image-Based Malware Classification

32. Dual Attention Network Approaches to Face Forgery Video Detection

33. Systematic Survey on Visually Meaningful Image Encryption Techniques

34. Systematic Literature Review of Security Event Correlation Methods

35. A New Approach for Secure Cloud-Based Electronic Health Record and its Experimental Testbed

36. Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing

37. TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU

38. Efficient Extended Chaotic Map-Based IBE for Industrial Environment

39. Digital Watermarking Technology Based on LDPC Code and Chaotic Sequence

40. Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality

41. An Automatically Privacy Protection Solution for Implementing the Right to Be Forgotten in Embedded System

42. On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms.

43. Quantization-Aided Secrecy: FD C-RAN Communications With Untrusted Radios.

44. A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance.

45. Relationship Structure Analysis on Determinants of Enterprise Information Security Investment Decision Based on ISM.

46. Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files.

47. Securing Intelligent Reflecting Surface Assisted Terahertz Systems.

48. Multi-Access Edge Offloading Based on Physical Layer Security in C-V2X System.

49. Measures to Ensure Cybersecurity of Industrial Enterprises: A Legal Perspective.

50. Digital watermarking—A tutorial.

Catalog

Books, media, physical & digital resources