Search

Your search keyword '"Data security"' showing total 197,734 results

Search Constraints

Start Over You searched for: Descriptor "Data security" Remove constraint Descriptor: "Data security"
197,734 results on '"Data security"'

Search Results

1. Confidential Container Groups.

2. Elevating Security with Arm CCA.

3. mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility.

4. Improving Privacy and Security of Telehealth.

5. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

6. The Pros and Cons of Regulating Artificial Intelligence.

7. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

8. Digital Payment Issues.

9. HIPAA: A Demand to Modernize Health Legislation

10. Privacy Risks in the Storytelling of Open Government Data: A Study from the Perspective of User Cognitive Reasoning.

11. Secure the Linux system and its files: The ever-watchful Nick Peers discovers how Linux is built from the ground up to help keep you and your data secure

12. Spent Fuel Transportation Cybersecurity in the Energy Sector for Public Health and Safety: Whether you're moving spent fuel rods, military munitions or military equipment, the procedures described are similar for reducing and managing cybersecurity threats

13. Boost your VPN Privacy

16. Does AI Technology Adoption Affect Auditors’ Decision-Making Capabilities: Evidence from Jordan?

17. A Whispering Widgets and Wireless Wonders Pioneering Change in the World of IoT

20. How Digital Trust Varies Around the World.

21. Customer Data: Designing for Transparency and Trust.

22. DSpace 7 Benefits: Is It Worth Upgrading?

24. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

25. Applications of blockchain technology in privacy preserving and data security for real time (data) applications.

26. High‐contrast QPSK pattern recognition device consisting of a 4×$\times$4 MMI coupler.

27. Energy-aware multi-attribute trust modal for secure MANET-IoT environment.

28. Unlocking the potential of precision agriculture for sustainable farming.

29. Dynamic security in cloud computing based on fuzzy cognitive maps.

30. Multi‐Objective Federated Averaging Algorithm.

31. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

32. Application of zero trust model in preventing medical errors.

33. RTrust: toward robust trust evaluation framework for fake news detection in online social networks.

34. PIoT‐fortifying IoT device identity and data access: A security framework empowered by blockchain.

35. Dark patterns: EU's regulatory efforts.

36. Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and DNA coding.

37. Blockchain Factors in the Design of Smart-Media for E-Healthcare Management.

38. Artificial Intelligence in Communication Sciences and Disorders: Introduction to the Forum.

39. Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification.

40. Choosing the right artificial intelligence solutions for your radiology department: key factors to consider.

41. ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles.

42. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

43. A global perspective for improving recovery and recycling programs: text analysis approaches.

44. The rule of law system for China's marine security.

45. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

46. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

47. MOBILE DEVICE SECURITY: A TWO-LAYERED APPROACH WITH BLOCKCHAIN AND SENSOR TECHNOLOGY FOR THEFT PREVENTION.

48. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

49. Digital signatures in electronic health records: a scoping review.

50. Elliptic Curve Cryptography and Password Based Key Derivation Function with Advanced Encryption Standard Method for Cloud Data Security.

Catalog

Books, media, physical & digital resources