scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "DATA security"

1 - 10 of 116,138 results for
 "DATA security"
Results per page:

Big Data Warehouse for Healthcare-Sensitive Data Applications.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Mar 28; Vol. 21 (7). Date of Electronic Publication: 2021 Mar 28.

Abstract:Obesity is a major public health problem worldwide, and the prevalence of childhood obesity is of particular concern. Effective interventions for preventing and treating childhood obesity aim to change behaviour and exposure at the individual, communit...

View details

The Research of Adaptive Data Desensitization Method Based on Middle Platform.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 8/18/2022, p1-7. 7p.

Abstract:With the popularization of Middle Platform characterized by data aggregating and governance, the security protection of data is paying more and more attention, and the data desensitization technology is widely used. In order to solve the high threshold...

View details

Visual Attention and Motion Estimation-Based Video Retargeting for Medical Data Security.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/9/2022, p1-11. 11p.

Abstract:Medical data security is an important guarantee for intelligent medical system. Medical video data can help doctors understand the patients' condition. Medical video retargeting can greatly reduce the storage capacity of data on the premise of preservi...

View details

Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/29/2022, p1-10. 10p.

Abstract:Today there are few studies on data file security strategies, but with the increase in information technology, the more the security of data files cannot be ignored. In this paper, based on the research of data file security policy, a model of data fil...

View details

THE OPM DATA BREACH: AN INVESTIGATION OF SHARED EMOTIONAL REACTIONS ON TWITTER.

Publication Type:Academic Journal

Source(s):MIS Quarterly. Jun2022, Vol. 46 Issue 2, p881-910. 30p. 2 Diagrams, 12 Charts, 6 Graphs.

Abstract:This paper investigates the shared emotional responses of Twitter users in the aftermath of a massive data breach, a crisis event known as the Office of Personnel Management (OPM) data breach of 2015. This breach impacted the lives of several million i...

View details

An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/10/2022, p1-13. 13p.

Abstract:Topics such as computational sources and cloud-based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud-based data and grid facilities. Various categories of cloud ser...

View details

Exploit-oriented Automated Information Leakage.

Publication Type:Academic Journal

Source(s):International Journal of Sustainable Development & Planning. Aug2022, Vol. 17 Issue 5, p331-350. 20p.

Abstract:Automatic Exploit Generation (AEG) has become one of the most important ways to demonstrate the exploitability of vulnerabilities. However, state-of-the-art AEG solutions in general assume the target system has no mitigations deployed, which is not tru...

View details

An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 9/1/2022, p1-17. 17p.

Abstract:Security threats such as data forgery and leakage may occur when sharing data in cloud environments. Therefore, it is important to encrypt your data and securely access it when sharing it with other users via a cloud server. Of the various security tec...

View details

An Interpretable Artificial Intelligence Based Smart Agriculture System.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 2, p3777-3797. 21p.

Abstract:With increasing world population the demand of food production has increased exponentially. Internet of Things (IoT) based smart agriculture system can play a vital role in optimising crop yield by managing crop requirements in real-time. Interpretabil...

View details

Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 2, p3549-3570. 22p.

Abstract:The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the ho...

View details

banner_970x250 (970x250)

sponsored