Search

Showing total 220 results

Search Constraints

Start Over You searched for: Topic data security failures Remove constraint Topic: data security failures Publisher springer nature Remove constraint Publisher: springer nature
220 results

Search Results

1. Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach.

2. A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems.

3. MAIDS: malicious agent identification-based data security model for cloud environments.

4. A large-scale data security detection method based on continuous time graph embedding framework.

5. Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners.

6. Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis.

7. Machine learning-based intrusion detection: feature selection versus feature extraction.

8. An efficient polynomial-based verifiable computation scheme on multi-source outsourced data.

9. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat.

10. IoT-based intrusion detection system for healthcare using RNNBiLSTM deep learning strategy with custom features.

11. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS.

12. An extended lightweight blockchain based collaborative healthcare system for fraud prevention.

13. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation.

14. Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum.

15. A method for insider threat assessment by modeling the internal employee interactions.

16. Robust password security: a genetic programming approach with imbalanced dataset handling.

17. Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature.

18. An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network.

19. Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment.

20. Machine learning interpretability meets TLS fingerprinting.

21. A blockchain-based privacy preservation scheme in multimedia network.

22. URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models.

23. Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation.

24. Deep learning approach to security enforcement in cloud workflow orchestration.

25. LSTM-AE-WLDL: Unsupervised LSTM Auto-Encoders for Leak Detection and Location in Water Distribution Networks.

26. Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities.

27. Hyperspectral image classification using an encoder-decoder model with depthwise separable convolution, squeeze and excitation blocks.

28. Telugu DNA for Safe Delivery: A Secured Text Communication.

29. A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.

30. Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities.

31. An efficient method for privacy-preserving trajectory data publishing based on data partitioning.

32. Patient's data privacy and security in mHealth applications: a Charles proxy-based recommendation.

33. Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.

34. Trust and The Acquisition and Use of Public Health Information.

35. Privacy-preserving and Utility-aware Participant Selection for Mobile Crowd Sensing.

36. An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy.

37. Breaking MPC implementations through compression.

38. Incentive-driven attacker for corrupting two-party protocols.

39. Utility analysis on privacy-preservation algorithms for online social networks: an empirical study.

40. A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture.

41. Designated server-aided revocable identity-based keyword search on lattice.

42. Marx, Foucault, and state–corporate harm: a case study of regulatory failure in Australian non-prescription medicine regulation.

43. A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme.

44. Dynamic analysis of residential and enterprise water supply and leakage efficiencies.

45. An optimistic technique to detect Cache based Side Channel attacks in Cloud.

46. Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review.

47. Fast Automated Processing and Evaluation of Identity Leaks.

48. Performance Analysis of Privacy Protection System During Data Transfer in MANETs.

49. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security.

50. Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment.