بحث بسيط
السجلات المعروضة 1 -- 10 من 74
Role updating in information systems using model checking
(
Springer London
, 2017 , Article)
The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
(
Springer
, 2023 , Other)
Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ...
Smart Grid Cybersecurity: Standards and Technical Countermeasures
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
(
Churchill Livingstone
, 2019 , Article)
Background
The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions.
Objective
To discover the ...
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
(
Elsevier
, 2021 , Article)
Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ...
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
Monitoring DVT cuffs for long-term operation: A fuzzy approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
Group owner election in Wi-Fi direct
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...