Loading…
A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
Nagurney, Anna, Daniele, Patrizia, Shukla, Shivani
Published in Annals of operations research (01.01.2017)
Published in Annals of operations research (01.01.2017)
Get full text
Journal Article
Loading…
A Review of Data Security in Cloud Computing
Kumar, Aditya, Bhardwaj, Adi, Singh, Abhishek
Published in International Conference on Computing, Communication, and Networking Technologies (Online) (06.07.2023)
Published in International Conference on Computing, Communication, and Networking Technologies (Online) (06.07.2023)
Get full text
Conference Proceeding
Loading…
Hybrid Deep Learning Approaches for Data Security in Cloud Environments
Rekha, S., Sharma, Manish, Kannan, Sathish, Upadhye, Vijay Jagdish, Patil, Harshal, Rajkumar, S.
Published in 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (04.01.2024)
Published in 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (04.01.2024)
Get full text
Conference Proceeding
Loading…
Blockchain-Enabled Data Security in Healthcare: Reducing Data Breaches and Enhancing Patient Trust
Bisht, Sameer Singh, Bindu Mohapatra, Bibha, Kumar, Arvind
Published in 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES) (24.04.2025)
Published in 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES) (24.04.2025)
Get full text
Conference Proceeding
Loading…
Cross-subject data security risk assessment method and system based on deep learning
LIN BINGSHENG, CHANG HONG, CHEN GUIMIN, YANG XIN'EN, GAO LIZHEN, YE QING
Year of Publication 16.05.2025
Get full text
Year of Publication 16.05.2025
Patent
Loading…
Loading…
Prospective acceptance of distinct mobile mental health features in psychiatric patients and mental health professionals
Hendrikoff, Leonie, Kambeitz-Ilankovic, Lana, Pryss, Rüdiger, Senner, Fanny, Falkai, Peter, Pogarell, Oliver, Hasan, Alkomiet, Peters, Henning
Published in Journal of Psychiatric Research (01.02.2019)
Published in Journal of Psychiatric Research (01.02.2019)
Get full text
Journal Article
Loading…
Loading…
Study on Data Security Policy Based on Cloud Storage
Diao Zhe, Wang Qinghong, Su Naizheng, Zhang Yuhan
Published in 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids) (01.05.2017)
Published in 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids) (01.05.2017)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Research and Practice of Grid Data Security Classification and Grading
Fan, Jinqiang, Xu, Yonggang, Ma, Jing, Cao, Yaming, Zheng, Chen, Yang, Jing
Published in 2023 International Conference on Power Energy Systems and Applications (ICoPESA) (24.02.2023)
Published in 2023 International Conference on Power Energy Systems and Applications (ICoPESA) (24.02.2023)
Get full text
Conference Proceeding
Loading…
Loading…
Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]
Tay, Albert, M Hayes, Sebastian, Wilson, Drew, Hall, Emmie, Kaufman, Dallin
Published in Issues in informing science & information technology education (2024)
Published in Issues in informing science & information technology education (2024)
Get full text
Journal Article
Loading…