-
1
The downsides of information systems security policy compliance efforts
منشور في 2016"…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
Impacts of Diverse Workforce on Cyber Security and Information Technology Management
منشور في 2023"…Identify major influencing factors of diversity which has impacts on efficiency of cyber security and information technology management and challenges within the cyber security and information technology management domains. …"
احصل على النص الكامل
-
3
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
4
Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
منشور في 2023"…These innovative approaches provide a more dynamic, responsive, and holistic approach to risk management, thereby significantly improving the IT security of SMEs. The study’s implications underscore the urgency of developing flexible, dynamic, and technology-informed IT risk-management strategies, offering novel insights into a more practical approach to IT risk management.…"
-
5
-
6
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. …"
-
7
IS security menace
منشور في 2016"…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Roadmap for National Adoption of Blockchain Technology Towards Securing the Food System of Qatar
منشور في 2024"…<div><p>The national adoption of any technology involves the tight cooperation between the government and the key players involved in the sector of significance. This study highlights a road map toward blockchain technology (BCT) adoption and how it can catalyze better collaboration between the national authorities who play a vital role in securing food systems. …"
-
9
Secure and Anonymous Communications Over Delay Tolerant Networks
منشور في 2020"…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …"
-
10
-
11
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In order to attain the full-pledged security of any IoT-driven system the significant contribution presented by artificial neural networks (ANNs) is worthy to be highlighted. …"
-
12
Supporting secure dynamic alert zones using searchable encryption and graph embedding
منشور في 2023"…Our extensive experimental evaluation shows that our solutions can significantly improve computational overhead compared to existing baselines.…"
-
13
Board changes and CEO turnover
منشور في 2014"…For firms that decrease independence, the CEO turnover performance sensitivity significantly decreases following SOX. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
14
-
15
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
منشور في 2024"…Nevertheless, the rapid growth of IoT devices has introduced significant security concerns like device vulnerabilities, unauthorized access, and potential data breaches.This article deals with an immediate call to empower IoT resilience against a wide range of sophisticated and prevalent cybersecurity threats. …"
-
16
The metaverse digital environments: a scoping review of the challenges, privacy and security issues
منشور في 2023"…<p dir="ltr">The concept of the “metaverse” has garnered significant attention recently, positioned as the “next frontier” of the internet. …"
-
17
A slow but steady nanoLuc: R162A mutation results in a decreased, but stable, nanoLuc activity
منشور في 2024"…<p dir="ltr">NanoLuc (NLuc) <u>luciferase</u> has found extensive application in designing a range of <u>biologica</u><u>l</u><u> assays,</u> including <u>gene expression analysis</u>, protein-protein interaction, and protein conformational changes due to its enhanced brightness and small size. …"
-
18
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…<p dir="ltr">Energy efficiency and safety are two essential factors that play a significant role in operating a wireless sensor network. …"
-
19
An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm
منشور في 2023"…The authors propose an efficient and secure compression method incorporating a secret key to accomplish this goal. …"
-
20
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…"