|
|
|
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Yi-Wei Wang and Ja-Ling Wu
This work presents an efficient and effective system allowing hospitals to share patients? private information while ensuring that each hospital database?s medical records will not be leaked; moreover, the privacy of patients who access the data will als...
ver más
|
|
|
|
|
|
|
In Lee
To address rapidly growing data breach incidents effectively, healthcare providers need to identify various insider and outsider threats, analyze the vulnerabilities of their internal security systems, and develop more appropriate data security measures ...
ver más
|
|
|
|
|
|
|
Tsuyang Wu, Xinglan Guo, Yehcheng Chen, Saru Kumari and Chienming Chen
At present, the great progress made by the Internet of Things (??????
I
o
T
) has led to the emergence of the Internet of Drones (??????
I
o
D
). ??????
I
o
D
is an extension of the ??????
I
o
T
, which is used to control and manipulate drones entering ...
ver más
|
|
|
|
|
|
|
D. V. Smirnov
Pág. 88 - 94
The methodology of organization of search in Big Data, performed in the mode of limited time, of signs of malicious insider activities is discussed. The methodology is tested in a large industrial organization, the operating infrastructure of which cover...
ver más
|
|
|
|
|
|
|
D. V. Smirnov,A. A. Grusho,M. I. Zabezhailo,E. E. Timonina
Pág. 64 - 71
The problem of constructing an architecture and methods of searching for insider activity signs in process-real-time conditions has been investigated. The problem is solved in the following conditions. The source of "raw" data is Big Data, from which dat...
ver más
|
|
|
|
|
|
|
Jianhua Liu and Zibo Wu
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic...
ver más
|
|
|
|
|
|
|
Parinya Suwansrikham, She Kun, Shaukat Hayat and Jehoiada Jackson
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a...
ver más
|
|
|
|
|
|
|
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
ver más
|
|
|
|