64   Artículos

 
en línea
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz    
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu    
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yi-Wei Wang and Ja-Ling Wu    
This work presents an efficient and effective system allowing hospitals to share patients? private information while ensuring that each hospital database?s medical records will not be leaked; moreover, the privacy of patients who access the data will als... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
In Lee    
To address rapidly growing data breach incidents effectively, healthcare providers need to identify various insider and outsider threats, analyze the vulnerabilities of their internal security systems, and develop more appropriate data security measures ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tsuyang Wu, Xinglan Guo, Yehcheng Chen, Saru Kumari and Chienming Chen    
At present, the great progress made by the Internet of Things (?????? I o T ) has led to the emergence of the Internet of Drones (?????? I o D ). ?????? I o D is an extension of the ?????? I o T , which is used to control and manipulate drones entering ... ver más
Revista: Drones    Formato: Electrónico

 
en línea
D. V. Smirnov     Pág. 88 - 94
The methodology of organization of search in Big Data, performed in the mode of limited time, of signs of malicious insider activities is discussed. The methodology is tested in a large industrial organization, the operating infrastructure of which cover... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
D. V. Smirnov,A. A. Grusho,M. I. Zabezhailo,E. E. Timonina     Pág. 64 - 71
The problem of constructing an architecture and methods of searching for insider activity signs in process-real-time conditions has been investigated. The problem is solved in the following conditions. The source of "raw" data is Big Data, from which dat... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Jianhua Liu and Zibo Wu    
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Parinya Suwansrikham, She Kun, Shaukat Hayat and Jehoiada Jackson    
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »