UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 57
21.
  • DATELE CONFIDENȚIALE CU CAR... DATELE CONFIDENȚIALE CU CARACTER PERSONAL PROTEJATE ÎN REGIM DE SECRET PROFESIONAL: ASPECTE DE DREPT PENAL COMPARAT
    Costică MOŢOC Studia Universitatis. Seria "Ştiinţe sociale", 02/2020 11
    Journal Article
    Peer reviewed
    Open access

    În articol sunt analizate soluțiile legislative în materie penală ale statelor străine în ceea ce priveşte protecția datelor confidențiale cu caracter personal în regim juridic de secret profesional. ...
Full text
22.
  • Application of access contr... Application of access control model for confidential data
    Shan, Lumin; Zhou, Huan; Hong, Daocheng ... Procedia computer science, 2021, 2021-00-00, Volume: 192
    Journal Article
    Peer reviewed
    Open access

    In any field, the security of data is extremely important, and it is even related to national security and personal privacy. Within a mature system framework, the design of data security is the most ...
Full text

PDF
23.
  • Cloud Security Using Fine-G... Cloud Security Using Fine-Grained Efficient Information Flow Tracking
    Alqahtani, Fahad; Almutairi, Mohammed; Sheldon, Frederick T. Future internet, 04/2024, Volume: 16, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud ...
Full text
24.
  • Federated Learning for Intr... Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case
    Novikova, Evgenia; Doynikova, Elena; Golubev, Sergey Algorithms, 04/2022, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    One of the challenges in the Internet of Things systems is the security of the critical data, for example, data used for intrusion detection. The paper research construction of an intrusion detection ...
Full text
25.
  • Children and youth safety o... Children and youth safety on the Internet: Experiences from Czech Republic and Poland
    Tomczyk, Lukasz; Kopecky, Kamil Telematics and informatics, 08/2016, Volume: 33, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    •A lot of young people have problems with control of online information, which were uploaded to websites.•The online risky behavior of children is connected with online sharing of personal ...
Full text

PDF
26.
  • VA’s National PTSD Brain Ba... VA’s National PTSD Brain Bank: a National Resource for Research
    Friedman, Matthew J.; Huber, Bertrand R.; Brady, Christopher B. ... Current psychiatry reports, 10/2017, Volume: 19, Issue: 10
    Journal Article
    Peer reviewed

    The National PTSD Brain Bank (NPBB) is a brain tissue biorepository established to support research on the causes, progression, and treatment of PTSD. It is a six-part consortium led by VA’s National ...
Full text
27.
  • Patient Confidential Inform... Patient Confidential Information Transmission Using the Integration of PSO-Based Biomedical Signal Steganography and Threshold-Based Compression
    Chen, Shih-Ying; Lin, Shan-Ju; Tsai, Ming-Cheng ... Journal of medical and biological engineering, 08/2021, Volume: 41, Issue: 4
    Journal Article

    Purpose Electrocardiogram (ECG) signals aid in the clinical assessment of essential body functions by measuring pulse rate, intracranial pressure, respiration rate, and blood pressure. Additionally, ...
Full text
28.
  • SECRETUL PROFESIONAL AL JUR... SECRETUL PROFESIONAL AL JURNALISTULUI ÎN VIZIUNEA LEGII PENALE ȘI A JURISPRUDENȚEI CtEDO
    Lilia GÎRLA Studia Universitatis. Seria "Ştiinţe sociale", 02/2020 11
    Journal Article
    Peer reviewed
    Open access

    În cadrul acestui demers științific sunt elaborate unele soluții privind protecția juridico-penală a secretului profesional al jurnalistului. Fundamentarea cadrului conceptual preconizează ...
Full text
29.
  • Internet of things assisted... Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography
    Bi, Dexu; Kadry, Seifedine; Kumar, Priyan Malarvizhi IET intelligent transport systems, 11/2020, Volume: 14, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    In cloud computing, data sharing and security are considered as the significant challenging issues in the present era. Until recently, considering secure data sharing in the cloud, several problems ...
Full text

PDF
30.
Full text

PDF
1 2 3 4 5
hits: 57

Load filters