|
|
|
Nicollas Rodrigues de Oliveira, Yago de Rezende dos Santos, Ana Carolina Rocha Mendes, Guilherme Nunes Nasseh Barbosa, Marcela Tuler de Oliveira, Rafael Valle, Dianne Scherly Varela Medeiros and Diogo M. F. Mattos
The COVID-19 pandemic has highlighted the necessity for agile health services that enable reliable and secure information exchange, but achieving proper, private, and secure sharing of EMRs remains a challenge due to diverse data formats and fragmented r...
ver más
|
|
|
|
|
|
|
Chen Li, Yinxu Lu, Yong Bian, Jie Tian and Mu Yuan
The quality and safety of agricultural products involve a variety of risk factors, a large amount of risk information data, and multiple circulation and disposal processes, making it difficult to accurately trace the source of risks. To achieve precise t...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Daniel Barros, Isabela Almeida, Ariele Zanfei, Gustavo Meirelles, Edevar Luvizotto, Jr. and Bruno Brentan
Leakages in distribution networks reach more than 30% of the water supplied, entailing important risks for the water infrastructure with water contamination issues. Therefore, it is necessary to develop new methods to mitigate the amount of water wastes....
ver más
|
|
|
|
|
|
|
Pavlos Cheimonidis and Konstantinos Rantos
Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments where th...
ver más
|
|
|
|
|
|
|
Miroslav Kelemen, Volodymyr Polishchuk, Martin Kelemen, Jr. and Jozef Sabo
The agenda of the international community is focused on the global problem of aviation in the lack of pilots while maintaining the quality of their professional education. The trend is to explore the potential of students and help increase resistance to ...
ver más
|
|
|
|
|
|
|
José Brás, Ruben Pereira and Sérgio Moro
Robotic process automation and intelligent process automation have gained a foothold in the automation of business processes, using blocks of software (bots). These agents interact with systems through interfaces, replacing human intervention with the ai...
ver más
|
|
|
|
|
|
|
Ibrahim Bu Haimed, Marwan Albahar and Ali Alzubaidi
Cloud services provided by Microsoft are growing rapidly in number and importance. Azure Active Directory (AAD) is becoming more important due to its role in facilitating identity management for cloud-based services. However, several risks and security i...
ver más
|
|
|
|
|
|
|
Norah Abanmi, Heba Kurdi and Mai Alzamel
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma...
ver más
|
|
|
|