نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
In this paper we discuss a problem of data protection against the physical threats of loss and theft. We highlight the current challenges and propose a heuristic approach based on users’ smartphone use patterns to address them. Anomaly detection might be effectively used for at least an additional measure with the existing authentication methods to enhance usability and security against the phy...
Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization basis. Several companies have already built Internet consumer services such as search engine, use of some websites to communicate with other user in websites, E-mail services, and ...
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer, user profile disclosure or data disclosure itself. Identifying the threats and the technology that may be used for pro...
Emerging infectious diseases continue to impose unpredictable burdens on global health and economy. Infectious disease surveillance and pandemic preparedness are essential to mitigate the impact of future threats. Global surveillance networks provide unprecedented monitoring data on plant, animal and human infectious diseases. Using such sources, we report on current major One Health threats an...
Introduction: Today, the use of strategic planning capacities can well illustrate the development path of university exercise. The aim of this study was to design sports strategies at Shiraz University of Medical Sciences at all levels of the organization. Methods: The present study was descriptive and the statistical population was in several groups. The Delphi method was used to assess the st...
Over the past several years, the Internet environment has become more complex and untrusted. Enterprise networked systems are inevitably exposed to the increasing threats posed by hackers as well as malicious users internal to a network. IDS technology is one of the important tools used now-a-days, to counter such threats. Various IDS techniques has been proposed, which identifies and alarms fo...
In this paper, we present an infrastructure for providing secure transactional support for mobile databases. Our infrastructure protects against external threats — malicious actions by nodes not authorized to access the data. The major contribution of this paper, however, is to classify and present algorithms to protect against internal security threats. Internal threats are malicious actions b...
With fast developments in digital media and communication, transmission of video data over Internet is unsecured due to various security threats. Digital video should be encrypted using any of the cryptographic methods in order to prevent security threats. Cryptography is used for encrypting and decrypting the digital data. Traditional cryptographic systems are often not enough for fast transmi...
BACKGROUND Mental health clinicians are frequently asked to assess the risks presented by patients making threats to kill, but there are almost no data to guide such an evaluation. METHOD This data linkage study examined serious violence following making threats to kill and the potential role of mental disorder. A total of 613 individuals convicted of threats to kill had their prior contact w...
Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید