Search

Your search keyword '"Computer Security statistics & numerical data"' showing total 110 results

Search Constraints

Start Over You searched for: Descriptor "Computer Security statistics & numerical data" Remove constraint Descriptor: "Computer Security statistics & numerical data"
110 results on '"Computer Security statistics & numerical data"'

Search Results

1. What happens to rural hospitals during a ransomware attack? Evidence from Medicare data.

4. Perceived Security Risk Based on Moderating Factors for Blockchain Technology Applications in Cloud Storage to Achieve Secure Healthcare Systems.

5. New constructions of equality test scheme for cloud-assisted wireless sensor networks.

7. An efficient and provably secure key agreement scheme for satellite communication systems.

8. The value of federated learning during and post-COVID-19.

9. Immersive technologies as a solution for general data protection regulation in Europe and impact on the COVID-19 pandemic.

10. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.

11. Cybersecurity Risks in a Pandemic.

12. Survey of NCHDs in Ireland to assess their views and opinions in relation to participation in health research and the impact of new Irish data protection regulations.

13. Breeding unicorns: Developing trustworthy and scalable randomness beacons.

14. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.

15. Applying Deep Neural Networks over Homomorphic Encrypted Medical Data.

16. The effects of evolutionary adaptations on spreading processes in complex networks.

17. An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.

18. Trends and characteristics of protected health information breaches in the United States.

19. Basic reproduction ratios for periodic and time-delayed compartmental models with impulses.

20. S2HS- A blockchain based approach for smart healthcare system.

21. FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm.

22. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals.

24. Private Hospital Workflow Optimization via Secure k-Means Clustering.

25. Data breach remediation efforts and their implications for hospital quality.

26. Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality.

27. The Policy Effect of the General Data Protection Regulation (GDPR) on the Digital Public Health Sector in the European Union: An Empirical Investigation.

28. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.

29. Evaluation of Causes of Protected Health Information Breaches.

30. Understanding the relationship between data breaches and hospital advertising expenditures.

31. State feedback impulsive control of computer worm and virus with saturated incidence.

32. Trends in First-Year Dental Students' Information Technology Knowledge and Use: Results from a U.S. Dental School in 2009, 2012, and 2017.

33. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.

34. Detection of slow port scans in flow-based network traffic.

35. A beginner's guide to avoiding Protected Health Information (PHI) issues in clinical research - With how-to's in REDCap Data Management Software.

36. Imperceptible reversible watermarking of radiographic images based on quantum noise masking.

37. Cybersecurity needs women.

38. Cybersecurity needs women.

39. Data Integration and e-Commerce Threats Challenging Providers.

40. Press touch code: A finger press based screen size independent authentication scheme for smart devices.

41. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

42. Implementation of clinical research trials using web-based and mobile devices: challenges and solutions.

43. Statistically, What's the Chance of a Breach?

45. Big Data - big chance, big challenge.

46. [Single Patient Room Design in the Neonatal Intensive Care Unit - Parent Perceptions of Open Ward vs. Single Patient Room Units].

47. Attitude Towards Health Information Privacy and Electronic Health Records Among Urban Sri Lankan Adults.

48. Patients' Opinions on Display Methods to Protect Privacy.

49. Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings.

50. Individual privacy versus public good: protecting confidentiality in health research.

Catalog

Books, media, physical & digital resources