نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

2012
Ildar Muslukhov Yazan Boshmaf Hyoungshick Kim Konstantin Beznosov Cynthia Kuo Jonathan Lester

In this paper we discuss a problem of data protection against the physical threats of loss and theft. We highlight the current challenges and propose a heuristic approach based on users’ smartphone use patterns to address them. Anomaly detection might be effectively used for at least an additional measure with the existing authentication methods to enhance usability and security against the phy...

2013
K. L. NEELA

Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization basis. Several companies have already built Internet consumer services such as search engine, use of some websites to communicate with other user in websites, E-mail services, and ...

Journal: :Computer Standards & Interfaces 2003
Vanja Senicar Borka Jerman-Blazic Tomaz Klobucar

In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer, user profile disclosure or data disclosure itself. Identifying the threats and the technology that may be used for pro...

2016
Leslie A. Reperant John MacKenzie Albert D.M.E. Osterhaus

Emerging infectious diseases continue to impose unpredictable burdens on global health and economy. Infectious disease surveillance and pandemic preparedness are essential to mitigate the impact of future threats. Global surveillance networks provide unprecedented monitoring data on plant, animal and human infectious diseases. Using such sources, we report on current major One Health threats an...

Introduction: Today, the use of strategic planning capacities can well illustrate the development path of university exercise. The aim of this study was to design sports strategies at Shiraz University of Medical Sciences at all levels of the organization. Methods: The present study was descriptive and the statistical population was in several groups. The Delphi method was used to assess the st...

2012
Sneha Kumari Maneesh Shrivastava

Over the past several years, the Internet environment has become more complex and untrusted. Enterprise networked systems are inevitably exposed to the increasing threats posed by hackers as well as malicious users internal to a network. IDS technology is one of the important tools used now-a-days, to counter such threats. Various IDS techniques has been proposed, which identifies and alarms fo...

2000
Peter J. Keleher Bobby Bhattacharjee Kuo-Tung Kuo Ugur Cetintemel

In this paper, we present an infrastructure for providing secure transactional support for mobile databases. Our infrastructure protects against external threats — malicious actions by nodes not authorized to access the data. The major contribution of this paper, however, is to classify and present algorithms to protect against internal security threats. Internal threats are malicious actions b...

2013
JOHN SINGH

With fast developments in digital media and communication, transmission of video data over Internet is unsecured due to various security threats. Digital video should be encrypted using any of the cryptographic methods in order to prevent security threats. Cryptography is used for encrypting and decrypting the digital data. Traditional cryptographic systems are often not enough for fast transmi...

Journal: :Psychological medicine 2008
L J Warren P E Mullen S D M Thomas J R P Ogloff P M Burgess

BACKGROUND Mental health clinicians are frequently asked to assess the risks presented by patients making threats to kill, but there are almost no data to guide such an evaluation. METHOD This data linkage study examined serious violence following making threats to kill and the potential role of mental disorder. A total of 613 individuals convicted of threats to kill had their prior contact w...

2016
Dan E. Chamberlain Paolo Pedrini Mattia Brambilla Antonio Rolando Marco Girardello

Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید