31   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon    
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Evgenia Novikova, Elena Doynikova and Sergey Golubev    
One of the challenges in the Internet of Things systems is the security of the critical data, for example, data used for intrusion detection. The paper research construction of an intrusion detection system that ensures the confidentiality of critical da... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Daniel Yonto, L. Michele Issel and Jean-Claude Thill    
Spatial data analytics can detect patterns of clustering of events in small geographies across an urban region. This study presents and demonstrates a robust research design to study the longitudinal stability of spatial clustering with small case number... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Revista: Urban Science    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh     Pág. 173 - 185
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Xue Jun Li, Maode Ma and Yihan Sun    
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Gurtaj Singh, Vincenzo Violi and Marco Fisichella    
Healthcare data are distributed and confidential, making it difficult to use centralized automatic diagnostic techniques. For example, different hospitals hold the electronic health records (EHRs) of different patient populations; however, transferring t... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Christoph Stach, Clémentine Gritti, Julia Bräcker, Michael Behringer and Bernhard Mitschang    
The present information age is characterized by an ever-increasing digitalization. Smart devices quantify our entire lives. These collected data provide the foundation for data-driven services called smart services. They are able to adapt to a given cont... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov    
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa and Maxim Tanygin    
Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system based ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng    
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nicklas Guldåker    
Swedish emergency services still have relatively limited resources and time for proactive fire prevention. As a result of this, there is an extensive need for strategic working methods and knowledge to take advantage of spatial analyses. In addition, dec... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Nam Kyu Park and Jung Hun Lee    
The purpose of this study is to prove the concept of the performance monitoring system of container terminals. PoC (Proof of Concept) is a realization of a certain method or idea in order to demonstrate its feasibility. The port authorities, such as gove... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
N.A. Naraliyev,D.I. Samal     Pág. 94 - 104
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono     Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Tzu-Ying Chiu and Ying-Chih Lai    
The study of managing risk in aviation is the key to improving flight safety. Compared to the other flight operation phases, the approach and landing phases are more critical and dangerous. This study aims to detect and analyze unstable approaches in Tai... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Shamil Magomedov     Pág. 36 - 43
The article is devoted to the development of the architecture of computing systems with multilevel access control to web services over public networks. Information technologies are becoming global and cross-border which leads them to become an integral p... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly    
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »