Search

Your search keyword '"confidential data"' showing total 112 results

Search Constraints

Start Over You searched for: Descriptor "confidential data" Remove constraint Descriptor: "confidential data"
112 results on '"confidential data"'

Search Results

1. National Addiction and HIV Data Archive Program: Developing an Approach for Reuse of Sensitive and Confidential Data

2. Patient-Centric Decentralized Applications for Secure Personalized Medicine

3. Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment

4. Moment-based density estimation of confidential micro-data: a computational statistics approach.

5. Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment.

7. PERCEPȚII CU PRIVIRE LA SECURITATEA DATELOR CONFIDENȚIALE ÎN CADRUL REȚELELOR SOCIALE

8. Intelligent Healthcare System Using Mathematical Model and Simulated Annealing to Hide Patients Data in the Low-Frequency Amplitude of ECG Signals.

9. Review of Data Protection Technique

10. Aligning restricted access data with FAIR: a systematic review

11. Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case.

12. Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions

13. Protecting Values Close to Zero Under the Multiplicative Noise Method

14. Efficiency and Sample Size Determination of Protected Data

15. Reviewing the Methods of Estimating the Density Function Based on Masked Data

16. Intelligent Healthcare System Using Mathematical Model and Simulated Annealing to Hide Patients Data in the Low-Frequency Amplitude of ECG Signals

18. Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case

21. Comparative analysis of reversible data hiding schemes.

22. THE TIMES OF CYBER ATTACKS.

23. SPHN – The BioMedIT Network: A Secure IT Platform for Research with Sensitive Human Data.

24. Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques.

25. DAPA: Degradation-Aware Privacy Analysis of Android Apps

30. Protecting Micro-Data Privacy: The Moment-Based Density Estimation Method and its Application

31. NATIONAL ADDICTION AND HIV DATA ARCHIVE PROGRAM: DEVELOPING AN APPROACH FOR REUSE OF SENSITIVE AND CONFIDENTIAL DATA.

32. Density Approximant Based on Noise Multiplied Data

33. Information hiding scheme for digital images using difference expansion and modulus function.

34. Ensuring the Information Security of Information Communication Technology Users in Russia.

35. Reproducibility and Confidential Data

37. The BioRef Infrastructure, a Framework for Real-Time, Federated, Privacy-Preserving, and Personalized Reference Intervals: Design, Development, and Application.

38. A NEW APPROACH FOR CLOUD DATA SECURITY: FROM SINGLE TO CLOUD-OF-CLOUDS.

39. Report on the technical and legal framework for sharing confidential data

42. The Gra.fo project: from collection to dissemination

43. Suppressing Microdata to Prevent Probabilistic Classification Based Inference

44. An Adaptive Privacy Management System for Data Repositories

45. Spatial Analytics Based on Confidential Data for Strategic Planning in Urban Health Departments

46. Dealing with Privacy Obligations: Important Aspects and Technical Approaches

47. Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience

48. New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers

50. Patient-Centric Decentralized Applications for Secure Personalized Medicine.

Catalog

Books, media, physical & digital resources