Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Przeglądasz jako GOŚĆ

Wyszukujesz frazę ""Computer Security"" wg kryterium: Temat


Starter badań:

Tytuł :
The thin border between individual and collective ethics: the downside of GDPR.
Autorzy :
Cagnazzo C; Department of Sciences of Public Health and Pediatrics, University of Turin, Turin 10126, Italy; Dipartimento Patologia e Cura del Bambino 'Regina Margherita', AOU Città della Salute e della Scienza di Torino, Turin, Italy. Electronic address: .
Pokaż więcej
Źródło :
The Lancet. Oncology [Lancet Oncol] 2021 Nov; Vol. 22 (11), pp. 1494-1496.
Typ publikacji :
Journal Article
MeSH Terms :
Biomedical Research/*ethics
Computer Security/*legislation & jurisprudence
Confidentiality/*standards
Data Anonymization/*ethics
Health Records, Personal/*ethics
Computer Security/ethics ; Computer Security/standards ; Humans
Czasopismo naukowe
Tytuł :
FAIR Aspects of a Genomic Information Protection and Management System.
Autorzy :
Delgado J; Information Modeling and Processing (IMP) group - DMAG, Computer Architecture Department (DAC), Universitat Politècnica de Catalunya (UPC - BarcelonaTech), Spain.
Llorente S; Information Modeling and Processing (IMP) group - DMAG, Computer Architecture Department (DAC), Universitat Politècnica de Catalunya (UPC - BarcelonaTech), Spain.
Pokaż więcej
Źródło :
Studies in health technology and informatics [Stud Health Technol Inform] 2021 Nov 18; Vol. 287, pp. 50-54.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Privacy*
Confidentiality ; Genomics
Czasopismo naukowe
Tytuł :
Rapid and Blind Watermarking Approach of the 3D Objects Using QR Code Images for Securing Copyright.
Autorzy :
Al-Saadi HS; Department of Mathematics, Faculty of Applied Sciences, Umm Al-Qura University, Makkah, Saudi Arabia.
Elhadad A; Computer Science and Information Department, College of Science and Arts, Jouf University, Sakakah, Saudi Arabia.; Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt.
Ghareeb A; Department of Mathematics, Faculty of Science, Al-Baha University, Al-Bahah, Saudi Arabia.; Department of Mathematics, Faculty of Science, South Valley University, Qena, Egypt.
Pokaż więcej
Źródło :
Computational intelligence and neuroscience [Comput Intell Neurosci] 2021 Nov 16; Vol. 2021, pp. 2236866. Date of Electronic Publication: 2021 Nov 16 (Print Publication: 2021).
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Copyright*
Algorithms ; Humans ; Internet
Czasopismo naukowe
Tytuł :
Success indicators for an efficient utilization of cloud computing in healthcare organizations: Saudi healthcare as case study.
Autorzy :
Alassafi MO; Information Technology Department, Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia. Electronic address: .
Pokaż więcej
Źródło :
Computer methods and programs in biomedicine [Comput Methods Programs Biomed] 2021 Nov; Vol. 212, pp. 106466. Date of Electronic Publication: 2021 Oct 12.
Typ publikacji :
Journal Article
MeSH Terms :
Cloud Computing*
Computer Security*
Delivery of Health Care ; Reproducibility of Results ; Saudi Arabia
Czasopismo naukowe
Tytuł :
Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
Autorzy :
Krzyworzeka N; AGH University of Science and Technology, 30 Mickiewicza Ave., PL-30-059 Kraków, Poland.
Ogiela L; Pedagogical University of Krakow, Podchorążych 2 Street, PL-30-084 Kraków, Poland.
Ogiela MR; AGH University of Science and Technology, 30 Mickiewicza Ave., PL-30-059 Kraków, Poland.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 31; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 31.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Telemedicine*
Cognition ; Confidentiality
Czasopismo naukowe
Tytuł :
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Autorzy :
Meshram C; Department of Post Graduate Studies and Research in Mathematics, Jaywanti Haksar Govt. Post-Graduation College, College of Chhindwara University, Betul 460001, India.
Imoize AL; Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria.; Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801 Bochum, Germany.
Aljaedi A; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
Alharbi AR; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
Jamal SS; Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia.
Barve SK; Water Resources and Applied Mathematics Research Lab, Nagpur 440027, India.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 30; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 30.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Confidentiality*
Algorithms ; Computers ; Humans
Czasopismo naukowe
Tytuł :
Deceptive Techniques to Hide a Compressed Video Stream for Information Security.
Autorzy :
Heo J; Department of Electronic Engineering, Hanyang University, Seoul 04763, Korea.
Jeong J; Department of Electronic Engineering, Hanyang University, Seoul 04763, Korea.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 29; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 29.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Data Compression*
Algorithms ; Confidentiality
Czasopismo naukowe
Tytuł :
Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal.
Autorzy :
Daoudagh S; CNR-ISTI, 56124 Pisa, Italy.
Marchetti E; CNR-ISTI, 56124 Pisa, Italy.
Savarino V; Engineering Ingegneria Informatica S.p.A., 90146 Palermo, Italy.
Bernabe JB; Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain.
García-Rodríguez J; Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain.
Moreno RT; Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain.
Martinez JA; Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain.
Skarmeta AF; Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 28; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 28.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Privacy*
Cities ; Confidentiality ; Informed Consent
Czasopismo naukowe
Tytuł :
Implementation of Privacy and Security for a Genomic Information System.
Autorzy :
Delgado J; Information Modeling and Processing (IMP) group - DMAG, Computer Architecture Dept. (DAC).
Llorente S; Information Modeling and Processing (IMP) group - DMAG, Computer Architecture Dept. (DAC).
Reig G; inLab, Facultat d'Informàtica de Barcelona (FIB), Universitat Politècnica de Catalunya (UPC - BarcelonaTECH).
Pokaż więcej
Źródło :
Studies in health technology and informatics [Stud Health Technol Inform] 2021 Oct 27; Vol. 285, pp. 253-258.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Privacy*
Confidentiality ; Genomics ; Information Systems
Czasopismo naukowe
Tytuł :
A CAN-Bus Lightweight Authentication Scheme.
Autorzy :
Luo JN; Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Daxi District, Taoyuan City 335009, Taiwan.
Wu CM; Department of Electronic Engineering, Chuan Yuan Christian University, Chung-Li District, Taoyuan City 320314, Taiwan.
Yang MH; Department of Information and Computer Engineering, Chuan Yuan Christian University, Chung-Li District, Taoyuan City 320314, Taiwan.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 25; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 25.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Telemedicine*
Algorithms ; Communication ; Confidentiality ; Electronics
Czasopismo naukowe
Tytuł :
Intelligent Techniques for Detecting Network Attacks: Review and Research Directions.
Autorzy :
Aljabri M; Computer Science Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia.; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Aljameel SS; Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Mohammad RMA; Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Almotiri SH; Computer Science Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia.
Mirza S; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Anis FM; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Aboulnour M; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Alomari DM; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Engineering, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Alhamed DH; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Engineering, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Altamimi HS; SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 25; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 25.
Typ publikacji :
Journal Article; Review
MeSH Terms :
Computer Security*
Machine Learning*
Algorithms ; Forecasting ; Technology
Czasopismo naukowe
Tytuł :
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Autorzy :
Meshram C; Department of Post Graduate Studies and Research in Mathematics, Jaywanti Haksar Govt. Post-Graduation College, College of Chhindwara University, Betul 460001, India.
Imoize AL; Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria.; Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801 Bochum, Germany.
Aljaedi A; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
Alharbi AR; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
Jamal SS; Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia.
Barve SK; Water Resources and Applied Mathematics Research Lab, Nagpur 440027, India.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 23; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 23.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Telemedicine*
Algorithms ; Confidentiality ; Electronics
Czasopismo naukowe
Tytuł :
Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures.
Autorzy :
Fausto A; DITEN Department, University of Genoa, 16145 Genoa, Italy.
Gaggero GB; DITEN Department, University of Genoa, 16145 Genoa, Italy.
Patrone F; DITEN Department, University of Genoa, 16145 Genoa, Italy.
Girdinio P; DITEN Department, University of Genoa, 16145 Genoa, Italy.
Marchese M; DITEN Department, University of Genoa, 16145 Genoa, Italy.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 20; Vol. 21 (21). Date of Electronic Publication: 2021 Oct 20.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Information Systems*
Algorithms ; Computers ; Humans
Czasopismo naukowe
Tytuł :
The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia.
Autorzy :
Alharbi F; Computer Science Department, Huraymila College of Science and Humanities, Shaqra University, Shaqra 11961, Saudi Arabia.
Alsulami M; Computer Science Department, Community College-Shaqra, Shaqra University, Shaqra 11961, Saudi Arabia.
Al-Solami A; Computer Science Department, College of Computing and Information Technology, Shaqra University, Shaqra 11961, Saudi Arabia.
Al-Otaibi Y; Computer Science Department, College of Computing and Information Technology, Shaqra University, Shaqra 11961, Saudi Arabia.
Al-Osimi M; Computer Science Department, College of Computing and Information Technology, Shaqra University, Shaqra 11961, Saudi Arabia.
Al-Qanor F; Computer Science Department, College of Computing and Information Technology, Shaqra University, Shaqra 11961, Saudi Arabia.
Al-Otaibi K; Computer Science Department, College of Computing and Information Technology, Shaqra University, Shaqra 11961, Saudi Arabia.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 18; Vol. 21 (20). Date of Electronic Publication: 2021 Oct 18.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Saudi Arabia
Czasopismo naukowe
Tytuł :
Post-GDPR survey of data protection officers in research and non-research institutions in Croatia: a cross-sectional study.
Autorzy :
Mladinić A; Croatian Personal Data Protection Agency (AZOP), Zagreb, Croatia.
Puljak L; Center for Evidence-Based Medicine and Health Care, Catholic University of Croatia, Zagreb, Croatia.
Koporc Z; Center for Evidence-Based Medicine and Health Care, Catholic University of Croatia, Zagreb, Croatia.
Pokaż więcej
Źródło :
Biochemia medica [Biochem Med (Zagreb)] 2021 Oct 15; Vol. 31 (3), pp. 030703.
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Croatia ; Cross-Sectional Studies ; Humans
Czasopismo naukowe
Tytuł :
A Security Management and Control Solution of Smart Park Based on Sensor Networks.
Autorzy :
Zhao Y; Science and Technology on Communication Security Laboratory, Chengdu 610041, China.
Tian B; Science and Technology on Communication Security Laboratory, Chengdu 610041, China.
Niu Y; Science and Technology on Communication Security Laboratory, Chengdu 610041, China.
Zhang H; Science and Technology on Communication Security Laboratory, Chengdu 610041, China.
Yi Z; No.30 Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China.
Zeng R; Science and Technology on Communication Security Laboratory, Chengdu 610041, China.
Pokaż więcej
Źródło :
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Oct 13; Vol. 21 (20). Date of Electronic Publication: 2021 Oct 13.
Typ publikacji :
Journal Article
MeSH Terms :
Algorithms*
Computer Security*
Czasopismo naukowe
Tytuł :
Detecting phishing websites using machine learning technique.
Autorzy :
Dutta AK; Department of Computer Science and Information System, College of Applied Sciences, Almaarefa University, Riyadh, Saudi Arabia.
Pokaż więcej
Źródło :
PloS one [PLoS One] 2021 Oct 11; Vol. 16 (10), pp. e0258361. Date of Electronic Publication: 2021 Oct 11 (Print Publication: 2021).
Typ publikacji :
Journal Article
MeSH Terms :
Computer Security*
Internet*
Machine Learning*
Algorithms ; Databases as Topic ; Learning Curve
Czasopismo naukowe
Tytuł :
[Data protection and information security of digital health applications (DiGA)].
Autorzy :
Zilch A; ZFT.COMPANY GmbH, Burgstraße 2, 65817, Eppstein, Deutschland. .
Tschirsich M; ZFT.COMPANY GmbH, Burgstraße 2, 65817, Eppstein, Deutschland.
Pokaż więcej
Transliterated Title :
Datenschutz und Informationssicherheit bei digitalen Gesundheitsanwendungen (DiGA).
Źródło :
Bundesgesundheitsblatt, Gesundheitsforschung, Gesundheitsschutz [Bundesgesundheitsblatt Gesundheitsforschung Gesundheitsschutz] 2021 Oct; Vol. 64 (10), pp. 1254-1261. Date of Electronic Publication: 2021 Sep 15.
Typ publikacji :
Journal Article; Review
MeSH Terms :
Computer Security*
Confidentiality*
Germany
Czasopismo naukowe
Tytuł :
[Digitized healthcare in 2030-a possible scenario].
Autorzy :
Brönneke JB; health innovation hub (hih) des Bundesministeriums für Gesundheit, Torstr. 223, 10115, Berlin, Deutschland. .
Hagen J; health innovation hub (hih) des Bundesministeriums für Gesundheit, Torstr. 223, 10115, Berlin, Deutschland.
Kircher P; health innovation hub (hih) des Bundesministeriums für Gesundheit, Torstr. 223, 10115, Berlin, Deutschland.
Matthies H; health innovation hub (hih) des Bundesministeriums für Gesundheit, Torstr. 223, 10115, Berlin, Deutschland.
Pokaż więcej
Transliterated Title :
Digitalisierte Gesundheitsversorgung im Jahr 2030 – ein mögliches Szenario.
Źródło :
Bundesgesundheitsblatt, Gesundheitsforschung, Gesundheitsschutz [Bundesgesundheitsblatt Gesundheitsforschung Gesundheitsschutz] 2021 Oct; Vol. 64 (10), pp. 1285-1291. Date of Electronic Publication: 2021 Sep 17.
Typ publikacji :
Journal Article; Review
MeSH Terms :
Computer Security*
Health Facilities*
Academies and Institutes ; Delivery of Health Care ; Germany ; Humans
Czasopismo naukowe

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies