DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

48 49 50
hits: 47,753
491.
  • Towards Personalized User T... Towards Personalized User Training for Secure Use of Information Systems
    Fujs, Damjan; Vrhovec, Simon; Vavpotič, Damjan International arab journal of information technology, 05/2022, Volume: 19, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Information Systems (IS) represent an integral part of our lives, both in the organizational and personal sphere. To use them securely, users must be properly trained. The main problem is that most ...
Full text
Available for: UL
492.
  • Comprehensive survey on ima... Comprehensive survey on image steganalysis using deep learning
    Croix, Ntivuguruzwa Jean De La; Ahmad, Tohari; Han, Fengling Array, July 2024, 2024-07-00, 2024-07-01, Volume: 22
    Journal Article
    Peer reviewed
    Open access

    Steganalysis, a field devoted to detecting concealed information in various forms of digital media, including text, images, audio, and video files, has evolved significantly over time. This evolution ...
Full text
Available for: UL
493.
Full text
494.
  • Security Awareness Level Ev... Security Awareness Level Evaluation of Healthcare Participants Through Educational Games
    Pulido, Mario A.; Johnson, Chris W.; Alzahrani, Ahmed International journal of serious games, 09/2021, Volume: 8, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    The purpose of this paper consists of implementing an educational board game to evaluate the information security awareness level of healthcare personnel. The National Health Service Greater Glasgow ...
Full text
Available for: UL

PDF
495.
  • Conjunctive Keyword Search ... Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
    Yang, Yang; Ma, Maode IEEE transactions on information forensics and security, 04/2016, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed

    An electronic health (e-health) record system is a novel application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are the major ...
Full text
Available for: UL
496.
  • Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
    Hong Hu; Shinde, Shweta; Adrian, Sendroiu ... 2016 IEEE Symposium on Security and Privacy (SP), 05/2016
    Conference Proceeding, Journal Article

    As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information ...
Full text
Available for: UL
497.
  • Multiple watermarking techn... Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network
    Singh, Amit Kumar; Kumar, Basant; Singh, Sanjay Kumar ... Future generation computer systems, September 2018, 2018-09-00, Volume: 86
    Journal Article
    Peer reviewed

    The initial contribution in this paper begins with proposing a robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure social networks. ...
Full text
Available for: UL
498.
  • Attributing Cyber Attacks Attributing Cyber Attacks
    Rid, Thomas; Buchanan, Ben Journal of strategic studies, 01/2015, Volume: 38, Issue: 1-2
    Journal Article
    Peer reviewed
    Open access

    Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly ...
Full text
Available for: UL

PDF
499.
  • Heart Sound Abnormality Det... Heart Sound Abnormality Detection From Multi-Institutional Collaboration: Introducing a Federated Learning Framework
    Qiu, Wanyong; Quan, Chen; Zhu, Lixian ... IEEE transactions on biomedical engineering, 2024-May-03, Volume: PP
    Journal Article
    Peer reviewed

    Objective: Early diagnosis of cardiovascular diseases is a crucial task in medical practice. With the application of computer audition in the healthcare field, artificial intelligence (AI) has been ...
Full text
Available for: UL
500.
  • Study of the Telecommunicat... Study of the Telecommunication Networks Performance and Reliability Indicators
    Chedia, Nugzar; Chkhartishvili, Marina WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL, 7/2023, Volume: 18
    Journal Article

    It is currently urgent to improve the technical characteristics and increase the efficiency of telecommunication networks because of the global problem of ensuring the reliable transmission, ...
Full text
Available for: UL

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 47,753

Load filters