Showing 1 - 10 of 2,660
Persistent link: https://www.econbiz.de/10012619963
Persistent link: https://www.econbiz.de/10011889214
Road traffic accidents are caused 1.25 million deaths per year worldwide. To improve road safety and reducing road accidents, a recognition method for driving events is introduced in this paper. The proposed method detected and classified both driving behaviors and road anomalies patterns based...
Persistent link: https://www.econbiz.de/10012042657
Current intrusion detection systems are mostly for detecting external attacks, but the “Prism Door” and other similar events indicate that internal staff may bring greater harm to organizations in information security. Traditional insider threat detection methods only consider the audit...
Persistent link: https://www.econbiz.de/10012043281
Cloud computing has established a new horizon in the field of Information Technology. Due to the large number of users and extensive utilization, the Cloud computing paradigm attracts intruders who exploit its vulnerabilities. To secure the Cloud environment from such intruders an Intrusion...
Persistent link: https://www.econbiz.de/10012043362
Artificial Neural Networks (ANNs), especially back-propagation (BP) neural network, can improve the performance of intrusion detection systems. However, for the current network intrusion detection methods, the detection precision, especially for low-frequent attacks, detection stability and...
Persistent link: https://www.econbiz.de/10012043917
Cloud computing relies on sharing computing resources. With high availability and accessibility of resources, cloud computing is under the threat of major cyber-attacks. To detect attacks and preserve security in cloud environment, having an efficient intrusion detection system (IDS) is...
Persistent link: https://www.econbiz.de/10012045654
This article describes how the information about an individual's personal health is among ones most sensitive and important intangible belongings. When health information is misused, serious non-revertible damage can be caused, e.g. through making intimidating details public or leaking it to...
Persistent link: https://www.econbiz.de/10012045721
There has been a huge development in how to read a data from sensor device such as infrared (IR) device, temperature device, etc. Sensor data collection has wide issues of information security. Information security is also the current topic of discussion due to its use in application in various...
Persistent link: https://www.econbiz.de/10012047569
Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance...
Persistent link: https://www.econbiz.de/10012047574