Works matching DE "DATABASE security"
Results: 297
Privacy of health data needs stronger protection in emerging systems.
- Published in:
- Public Health Reports, 1994, v. 109, n. 5, p. 718
- Publication type:
- Article
An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 3113, doi. 10.1007/s11277-017-4664-7
- By:
- Publication type:
- Article
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 4, p. 2727, doi. 10.1007/s11277-015-2375-5
- By:
- Publication type:
- Article
PANORAMA DOS ACIDENTES DE TRABALHO-COM CAT NA REGIÃO SUL DO BRASIL DE 2009 A 2018.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 1, p. 1, doi. 10.54751/revistafoco.v17n1-089
- By:
- Publication type:
- Article
An epidemiologic study of physician-diagnosed chronic obstructive pulmonary disease in the Turkish population: COPDTURKEY-1.
- Published in:
- Turkish Journal of Medical Sciences, 2020, v. 50, n. 1, p. 132, doi. 10.3906/sag-1908-35
- By:
- Publication type:
- Article
Securing the Multitenancy Paradigm in Cloud Computing: An Exploration of Current Literature.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 754
- By:
- Publication type:
- Article
Countering Statistical Attacks in Cloud-Based Searchable Encryption.
- Published in:
- International Journal of Parallel Programming, 2020, v. 48, n. 3, p. 470, doi. 10.1007/s10766-018-0584-8
- By:
- Publication type:
- Article
The n-fold decrease method of linguistics variables, based on the private database extension.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 306, doi. 10.18372/2225-5036.20.7560
- By:
- Publication type:
- Article
Model and method of information security managing for social groups in the implementation of the second stage of pension reform in Ukraine.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 300, doi. 10.18372/2225-5036.20.7559
- By:
- Publication type:
- Article
Digital Forensics Readiness Framework (DFRF) to Secure Database Systems.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 2, p. 13732, doi. 10.48084/etasr.7116
- By:
- Publication type:
- Article
INTERFEJSY DOSTĘPU DO BAZ DANYCH - PRZEGLĄD TECHNOLOGII BORLAND, EMBARCADERO, SUN, ORACLE.
- Published in:
- Business Informatics / Informatyka Ekonomiczna, 2015, v. 3, n. 37, p. 48, doi. 10.15611/ie.2015.3.04
- By:
- Publication type:
- Article
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-024-00690-0
- By:
- Publication type:
- Article
Frame Structure and Engineering Applications of the Multisource System Cloud Service Platform of Monitoring of the Soft Rock Tunnel.
- Published in:
- Geofluids, 2021, p. 1, doi. 10.1155/2021/6672732
- By:
- Publication type:
- Article
INTELLIGNECE AND SECURITY DATABASE (ISD) VS. 'HARD CORE' SCIENCES DATABASES (HSCD): CHALLENGES AND OPPORTUNITIES.
- Published in:
- Singidunum Journal of Applied Sciences, 2014, p. 88, doi. 10.15308/SInteZa-2014-88-93
- By:
- Publication type:
- Article
SAFETY ANALYSIS OF REVERSE ALGORITHM ENCRYPTION IN DATABASES.
- Published in:
- Journal of Information Technology & Applications, 2019, v. 9, n. 1, p. 29, doi. 10.7251/JIT1901029L
- By:
- Publication type:
- Article
Genetic Reconstruction and Forensic Analysis of Chinese Shandong and Yunnan Han Populations by Co-Analyzing Y Chromosomal STRs and SNPs.
- Published in:
- Genes, 2020, v. 11, n. 7, p. 743, doi. 10.3390/genes11070743
- By:
- Publication type:
- Article
Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 74, doi. 10.3390/fi17020074
- By:
- Publication type:
- Article
INFRASTRUCTURE FOR RBAC-MAS: AN APPROACH BASED ON AGENT COORDINATION CONTEXTS.
- Published in:
- Applied Artificial Intelligence, 2007, v. 21, n. 4-5, p. 443, doi. 10.1080/08839510701253674
- By:
- Publication type:
- Article
APPLICATION PROFILING BASED ON ATTACK ALERT AGGREGATION.
- Published in:
- Journal of Information System Security, 2016, v. 12, n. 1, p. 27
- By:
- Publication type:
- Article
DATABASE SECURITY IN RDF TERMS.
- Published in:
- Buletin Stiintific, 2023, v. 28, n. 1, p. 55, doi. 10.2478/bsaft-2023-0006
- By:
- Publication type:
- Article
Classification Method for Network Security Data Based on Multi-featured Extraction.
- Published in:
- International Journal on Artificial Intelligence Tools, 2021, v. 30, n. 1, p. N.PAG, doi. 10.1142/S0218213021400066
- By:
- Publication type:
- Article
A SECURE DATA STORAGE APPROACH FOR ONLINE EXAMINATION PLATFORM USING CLOUD DBAAS SERVICE.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3715, doi. 10.12694/scpe.v25i5.3113
- By:
- Publication type:
- Article
DESIGN OF 0-DAY VULNERABILITY MONITORING AND DEFENSE ARCHITECTURE BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGY.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3491, doi. 10.12694/scpe.v25i5.3035
- By:
- Publication type:
- Article
RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 2, p. 1107, doi. 10.12694/scpe.v25i2.2604
- By:
- Publication type:
- Article
Femicide in Mexico: Statistical evidence of an increasing trend.
- Published in:
- PLoS ONE, 2023, v. 18, n. 12, p. 1, doi. 10.1371/journal.pone.0290165
- By:
- Publication type:
- Article
A qualitative study, using focused interviews, of the information needs of families whose children's names are on a cerebral palsy register.
- Published in:
- Child: Care, Health & Development, 2003, v. 29, n. 6, p. 465, doi. 10.1046/j.1365-2214.2003.00366.x
- By:
- Publication type:
- Article
Security, privacy and forensics in the enterprise information systems.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Is your control system vulnerable to an attack?
- Published in:
- Chemical Engineering, 2012, v. 119, n. 5, p. 5
- By:
- Publication type:
- Article
Trust but verify: Authorization for web services.
- Published in:
- Computer Systems Science & Engineering, 2006, v. 21, n. 5, p. 381
- By:
- Publication type:
- Article
Encouraging Creativity Through Copyright Protection: The 5 th IPA Copyright Conference Accra, Ghana, 20-22 February 2002.
- Published in:
- Publishing Research Quarterly, 2002, v. 18, n. 2, p. 41, doi. 10.1007/BF02687807
- By:
- Publication type:
- Article
Age invariant face recognition: a survey on facial aging databases, techniques and effect of aging.
- Published in:
- Artificial Intelligence Review, 2019, v. 52, n. 2, p. 981, doi. 10.1007/s10462-018-9661-z
- By:
- Publication type:
- Article
Data creation techniques and data-oriented models for dynamic security assessment of power system.
- Published in:
- Electrical Engineering, 2024, v. 106, n. 5, p. 5787, doi. 10.1007/s00202-024-02319-6
- By:
- Publication type:
- Article
Database Steganography: Hiding Complete Database In Another Database.
- Published in:
- Al-Yarmouk Journal, 2018, v. 10, n. 10, p. 1
- By:
- Publication type:
- Article
Biometrics Face Recognition Using Method of Wavelet and Curvelet Transforms with COVID-19.
- Published in:
- Review of Computer Engineering Studies, 2022, v. 9, n. 2, p. 82, doi. 10.18280/rces.090207
- By:
- Publication type:
- Article
Methodology for ensuring computer security for vulnerable systems.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 2, p. 185, doi. 10.21279/1454-864x-20-i2-025
- By:
- Publication type:
- Article
Understanding Data Forensics.
- Published in:
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 6, p. 36
- By:
- Publication type:
- Article
Organizations Struggle With IT Accountability.
- Published in:
- Internal Auditor, 2007, v. 64, n. 6, p. 21
- By:
- Publication type:
- Article
Data warehouse control & security.
- Published in:
- Internal Auditor, 1998, v. 55, n. 1, p. 54
- By:
- Publication type:
- Article
Impact of Homegrown School Feeding Program on Smallholders' Farmer Household Food Security in Northeastern Nigeria.
- Published in:
- Foods, 2023, v. 12, n. 12, p. 2408, doi. 10.3390/foods12122408
- By:
- Publication type:
- Article
SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION.
- Published in:
- Malaysian Journal of Computer Science, 2021, v. 34, n. 1, p. 1, doi. 10.22452/mjcs.vol34no1.1
- By:
- Publication type:
- Article
WEB BASED DATABASE SECURITY IN INTERNET OF THINGS USING FULLY HOMOMORPHIC ENCRYPTION AND DISCRETE BEE COLONY OPTIMIZATION.
- Published in:
- Malaysian Journal of Computer Science, 2020, p. 1, doi. 10.22452/mjcs.sp2020no1.1
- By:
- Publication type:
- Article
Grid and Data Analyzing and Security.
- Published in:
- Database Systems Journal, 2012, v. 3, n. 4, p. 61
- By:
- Publication type:
- Article
EXAMINING THE MODERATING EFFECT OF RISK ATTENUATION ON THE RELATIONSHIP BETWEEN INVESTOR SENTIMENT AND CASH FLOW VOLATILITY.
- Published in:
- Annals of the Constantin Brancusi University of Targu Jiu-Letters & Social Sciences Series, 2024, n. 2, p. 113
- By:
- Publication type:
- Article
Advancing database security: a comprehensive systematic mapping study of potential challenges.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6399, doi. 10.1007/s11276-023-03436-z
- By:
- Publication type:
- Article
Secure shortest distance queries over encrypted graph in cloud computing.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2633, doi. 10.1007/s11276-024-03692-7
- By:
- Publication type:
- Article
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 2, p. 523, doi. 10.1007/s11276-022-03142-2
- By:
- Publication type:
- Article
Blockchain Technology Based Information Classiication Management Service.
- Published in:
- Computers, Materials & Continua, 2021, v. 67, n. 2, p. 1489, doi. 10.32604/cmc.2021.013344
- By:
- Publication type:
- Article
ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2004, v. 18, n. 1, p. 3, doi. 10.1142/S0218001404003022
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2004, v. 18, n. 1, p. 1, doi. 10.1142/S0218001404003162
- By:
- Publication type:
- Article
APPROXIMATE QUERY PROCESSING USING MULTILAYERED DATA MODEL TO HANDLE ENVIRONMENTAL CONSTRAINTS, PRIVACY AND AVOIDING INFERENCES.
- Published in:
- International Journal of Cooperative Information Systems, 2007, v. 16, n. 2, p. 177, doi. 10.1142/S0218843007001627
- By:
- Publication type:
- Article