scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "security"

1 - 10 of 1,579,015 results for
 "security"
Results per page:

BYOD usage and security behaviour of hospital clinical staff: An Australian survey.

Publication Type:Academic Journal

Source(s):International journal of medical informatics [Int J Med Inform] 2022 Sep; Vol. 165, pp. 104839. Date of Electronic Publication: 2022 Jul 28.

Abstract:Objective: Healthcare professionals are known to use their personal devices extensively for work purposes (Bring-Your-Own-Device). However, it is also a source of major concern for healthcare organisations, given the heavy reliance of patient data priv...

View details

Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Jul 05; Vol. 22 (13). Date of Electronic Publication: 2022 Jul 05.

Abstract:Nowadays, the whole driver monitoring system can be placed inside the vehicle driver's smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the securi...

View details

Farmland Transfer, Social Security, and Households' Productive Investment: Based on China's CFPS Survey.

Publication Type:Academic Journal

Source(s):International journal of environmental research and public health [Int J Environ Res Public Health] 2022 Sep 04; Vol. 19 (17). Date of Electronic Publication: 2022 Sep 04.

Abstract:The willingness of farmers to transfer land on a big scale will be impacted when the rural social security system is not ideal, which will limit households' productive investment. This paper investigated the intermediate effects of social security on f...

View details

In-Vehicle Communication Cyber Security: Challenges and Solutions.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Sep 03; Vol. 22 (17). Date of Electronic Publication: 2022 Sep 03.

Abstract:In-vehicle communication has become an integral part of today's driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring, physical wi...

View details

SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Aug 30; Vol. 22 (17). Date of Electronic Publication: 2022 Aug 30.

Abstract:IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture com...

View details

Bayesian Estimation of Oscillator Parameters: Toward Anomaly Detection and Cyber-Physical System Security.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Aug 16; Vol. 22 (16). Date of Electronic Publication: 2022 Aug 16.

Abstract:Cyber-physical system security presents unique challenges to conventional measurement science and technology. Anomaly detection in software-assisted physical systems, such as those employed in additive manufacturing or in DNA synthesis, is often hamper...

View details

Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Aug 12; Vol. 22 (16). Date of Electronic Publication: 2022 Aug 12.

Abstract:Modern water distribution systems (WDSs) offer automated controls and operations to improve their efficiency and reliability. Nonetheless, such automation can be vulnerable to cyber-attacks. Therefore, various approaches have been suggested to detect c...

View details

The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.

Publication Type:Academic Journal

Source(s):Risk analysis : an official publication of the Society for Risk Analysis [Risk Anal] 2022 Aug; Vol. 42 (8), pp. 1623-1642. Date of Electronic Publication: 2021 May 07.

Abstract:The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, wher...

View details

Food security: embed equity in new targets.

Publication Type:Editorial & Opinion

Source(s):Nature [Nature] 2022 Aug; Vol. 608 (7923), pp. 472.

View details

CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Jul 03; Vol. 22 (13). Date of Electronic Publication: 2022 Jul 03.

Abstract:The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. N...

View details

banner_970x250 (970x250)

sponsored