Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Ozgu Can"'
Publikováno v:
IEEE Access, Vol 12, Pp 100419-100445 (2024)
Consent management has become an important issue with the increased usage of the Internet and also smart devices that collect personal data. Each country enacts its regulations and laws for consent management. These laws ensure that personal data is
Externí odkaz:
https://doaj.org/article/26be30bcdfe044568fa18bd09fc72d58
Publikováno v:
Cogent Engineering, Vol 11, Iss 1 (2024)
The rapid expansion of Internet of Things (IoT) technologies has revolutionized connectivity but has also exposed users to increased cyber threats. This study aims to enhance Intrusion Detection Systems (IDSs) for IoT networks by employing advanced m
Externí odkaz:
https://doaj.org/article/a1efe1438afd407fa62e2c7c4e1d9cb6
Autor:
Erhan Yilmaz, Ozgu Can
Publikováno v:
Engineering, Technology & Applied Science Research, Vol 14, Iss 2 (2024)
Insider threats pose a significant risk to organizations, necessitating robust detection mechanisms to safeguard against potential damage. Traditional methods struggle to detect insider threats operating within authorized access. Therefore, the use o
Externí odkaz:
https://doaj.org/article/2dc8f761c01740a3afab1c0791c3aabd
Publikováno v:
IEEE Access, Vol 10, Pp 95479-95497 (2022)
The development of technology accelerated the digital transformation of information systems. As a consequence of this digitization, data became available at any time and in any place. However, despite this ease of data accessibility, persons’ priva
Externí odkaz:
https://doaj.org/article/153e436fe4bb44879e4130f29ccefea6
Publikováno v:
International Journal of Intelligent Networks, Vol 3, Iss , Pp 16-30 (2022)
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such service
Externí odkaz:
https://doaj.org/article/d02f31222d494a698e169d949cc74ade
Publikováno v:
International Journal of Intelligent Networks, Vol 3, Iss , Pp 48-57 (2022)
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with highe
Externí odkaz:
https://doaj.org/article/1c2b72aaa7f04ebea088ed495d528737
Publikováno v:
Entropy, Vol 19, Iss 1, p 30 (2017)
Today’s technological improvements have made ubiquitous healthcare systems that converge into smart healthcare applications in order to solve patients’ problems, to communicate effectively with patients, and to improve healthcare service quality.
Externí odkaz:
https://doaj.org/article/2e4f0238257545a7ac139d1bd5c709c8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Publikováno v:
Cybernetics and Systems. :1-35