-
1
The downsides of information systems security policy compliance efforts
Published 2016“…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …”
Get full text
Get full text
Get full text
masterThesis -
2
Impacts of Diverse Workforce on Cyber Security and Information Technology Management
Published 2023“…Identify major influencing factors of diversity which has impacts on efficiency of cyber security and information technology management and challenges within the cyber security and information technology management domains. …”
Get full text
-
3
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
4
Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
Published 2023“…These innovative approaches provide a more dynamic, responsive, and holistic approach to risk management, thereby significantly improving the IT security of SMEs. The study’s implications underscore the urgency of developing flexible, dynamic, and technology-informed IT risk-management strategies, offering novel insights into a more practical approach to IT risk management.…”
-
5
-
6
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. …”
-
7
IS security menace
Published 2016“…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …”
Get full text
Get full text
Get full text
conferenceObject -
8
Roadmap for National Adoption of Blockchain Technology Towards Securing the Food System of Qatar
Published 2024“…<div><p>The national adoption of any technology involves the tight cooperation between the government and the key players involved in the sector of significance. This study highlights a road map toward blockchain technology (BCT) adoption and how it can catalyze better collaboration between the national authorities who play a vital role in securing food systems. …”
-
9
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …”
-
10
-
11
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In order to attain the full-pledged security of any IoT-driven system the significant contribution presented by artificial neural networks (ANNs) is worthy to be highlighted. …”
-
12
Supporting secure dynamic alert zones using searchable encryption and graph embedding
Published 2023“…Our extensive experimental evaluation shows that our solutions can significantly improve computational overhead compared to existing baselines.…”
-
13
Board changes and CEO turnover
Published 2014“…For firms that decrease independence, the CEO turnover performance sensitivity significantly decreases following SOX. …”
Get full text
Get full text
Get full text
Get full text
article -
14
-
15
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…Nevertheless, the rapid growth of IoT devices has introduced significant security concerns like device vulnerabilities, unauthorized access, and potential data breaches.This article deals with an immediate call to empower IoT resilience against a wide range of sophisticated and prevalent cybersecurity threats. …”
-
16
The metaverse digital environments: a scoping review of the challenges, privacy and security issues
Published 2023“…<p dir="ltr">The concept of the “metaverse” has garnered significant attention recently, positioned as the “next frontier” of the internet. …”
-
17
A slow but steady nanoLuc: R162A mutation results in a decreased, but stable, nanoLuc activity
Published 2024“…<p dir="ltr">NanoLuc (NLuc) <u>luciferase</u> has found extensive application in designing a range of <u>biologica</u><u>l</u><u> assays,</u> including <u>gene expression analysis</u>, protein-protein interaction, and protein conformational changes due to its enhanced brightness and small size. …”
-
18
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…<p dir="ltr">Energy efficiency and safety are two essential factors that play a significant role in operating a wireless sensor network. …”
-
19
An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm
Published 2023“…The authors propose an efficient and secure compression method incorporating a secret key to accomplish this goal. …”
-
20
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”