نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

2015
Kavitha S

Data publishing is recently focused more for the data analysis. In recent days, the data creation is enormous in all the fields. Predictive analytics uses all the data collected from various sources for predicting the future even though there is uncertainty in information gathered. The data used for analysis should not affect the privacy for the record owners. In all the sectors, organizations ...

2015
Brendan McBride Nigel McKelvey Kevin Curran

Contactless bank cards have been issued steadily to banking customers over the past four years and this trend has continued to grow rapidly more recently. We want to highlight a list of security issues as well as privacy threats to be concerned with when using such contactless bank cards. Further advances in smartphone technology applications can lead to new threats in relation to contactless b...

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

2016
Ayman Helmy Mohamed Aliaa A.A. Youssif Atef Z. Ghalwash

Cloud computing becomes the next-generation architecture of IT Enterprises. Cloud computing is a technology. It enables clients to use high-end services in a form of software as a service. These reside on different servers all over the world. There are many security threats in cloud computing. Data security is one of them. Data security raises client concerns. There are many issues of data secu...

2016
Scott Kulp Benjamin H. Strauss

Elevation data based on NASA’s Shuttle Radar Topography Mission (SRTM) have been widely used to evaluate threats from global sea level rise, storm surge, and coastal floods. However, SRTM data are known to include large vertical errors in densely urban or densely vegetated areas. The errors may propagate to derived land and population exposure assessments. We compare assessments based on SRTM d...

2014
Aditya Shrivastava Mukesh Baghel Hitesh Gupta

The growth of internet technology spread a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the purpose of data integrity and loss of data before 20 year Anderson developed a model of intrusion detection system. Initially intrusion detect...

Journal: :Conservation biology : the journal of the Society for Conservation Biology 2008
Heather Tallis Zach Ferdaña Elizabeth Gray

The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید