نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF
All aspects of the modern life are related to processing, communicating, storing and retrieving of information in computer networks and systems. Security of information and networks is of vital importance and very highly relevant nowadays in view of rampant attacks on information systems, evolving BYOD practices in enterprises, and particularly due to drives towards cloud-based integration of e...
The authors survey and describe the accepted submissions to the Symposium on Usable Privacy and Security (SOUPS) since its inception in 2005. We observe some noteworthy trends in both the accepted papers and in the authorship of those papers while keeping historical views of the trends in mind. We aim to identify emerging topics of interests in the usable privacy and security domain. Furthermor...
The 2012 International Conference on Computational Intelligence and Security (CIS) is the ninth one focusing on all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS). In particular, the CIS Conference provides a platform to explore the potential applications of CI models, algorithms, and technologies to IS. Among all accepted pa...
With the fast proliferation of various computational paradigms, from Web-based to wireless and mobile computing, intelligent data processing and security have become cross-cutting features of large scale Internet-based system. On the one hand, there is data being generated everywhere, from various sources and heterogenous formats (such as document repositories, business process data, network da...
The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 - 2016 were s...
This paper investigates the role of banking supervision in controlling bank risk. Banking supervision is measured in terms of enforcement outputs (i.e., on-site audits and sanctions). Our results show an inverted U-shaped relationship between on-site audits and bank risk, while the relationship between sanctions and risk appears to be linear and negative. We also consider the combined effect of...
Background and Aim: Increasing healthcare organizations’ efficiency is a necessity due to the resource scarcity in health sector. The aim of this study was to evaluate hospitals’ efficiency in Iran. Materials and Methods: This study was conducted using a systematic review and meta-analysis approach to find empirical research papers published on hospital efficiency in Iran between 1997 and 2016...
This paper studies a model of interpersonal bundling, in which a monopolist offers a good for sale under a regular price and a group purchase discount if the number of consumers in a group– the bundle size– belongs to some menu of intervals. We find that this is often a profitable selling strategy in response to demand uncertainty, and it can achieve the highest profit among all possible sellin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید