Showing 301 - 320 results of 341 for search '"data breach"', query time: 0.62s Refine Results
  1. 301

    Blockchain based medical image encryption using Arnold’s cat map in a cloud environment by Saba Inam, Shamsa Kanwal, Rabia Firdous, Fahima Hajjej

    Published 2024-03-01
    “…Storing or sending medical data through public clouds exposes information into potential eavesdropping, data breaches and unauthorized access. Encrypting data before transmission is crucial to mitigate these security risks. …”
    Get full text
    Article
  2. 302

    Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems by Aaron J. Boddy, William Hurst, Michael Mackay, Abdennour el Rhalibi

    Published 2019-01-01
    “…Without proactive monitoring of audit records, data breaches may go undetected. In addition, external threats, such as phishing or social engineering techniques to acquire a clinician's logon credentials, need to be identified. …”
    Get full text
    Article
  3. 303
  4. 304

    Phishing email detection using machine learning by Goh, Ying Ting

    Published 2021
    “…This can lead to identity theft, data breaches and financial losses for the victims. As such, it is important for individuals and organisations, particularly the government sector, to safeguard against such threats in a timely manner. …”
    Get full text
    Final Year Project (FYP)
  5. 305

    Privacy based classification model of public data by utilizing two-steps validation approach by Hussin,, Masnida, Raja Mahmood, Raja Azlina

    Published 2023
    “…It is further critical when this public data is already exposed to data breaches and data theft. In this work, we propose a data privacy classification approach for public data where this data resides on digital platforms. …”
    Article
  6. 306

    Ensemble synthesized minority oversampling-based generative adversarial networks and random forest algorithm for credit card fraud detection. by Ghaleb, Fuad A., Saeed, Faisal, Al-Sarem, Mohammed, Qasem, Sultan Noman, Al-Hadhrami, Tawfik

    Published 2023
    “…Most credit card frauds are conducted online by illegally obtaining payment credentials through data breaches, phishing, or scamming. Many solutions have been suggested to address the credit card fraud problem for online transactions. …”
    Get full text
    Article
  7. 307

    Survey of Public Attitudes toward the Secondary Use of Public Healthcare Data in Korea by Junho Jung, Hyungjin Kim, Seung-Hwa Lee, Jungchan Park, Sungsoo Lim, Kwangmo Yang

    Published 2023-10-01
    “…Concerns were frequently noted regarding commercial use of data and data breaches. Among the respondents, 50.9% were negative about the use of public healthcare data by private insurance companies, 22.9% favored this use, and 1.9% were “very positive.” …”
    Get full text
    Article
  8. 308

    KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks by Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy G., Rajesh Kaluri, Gautam Srivastava, Ohyun Jo

    Published 2020-01-01
    “…Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. …”
    Get full text
    Article
  9. 309

    Data Vaults for Blockchain-Empowered Accounting Information Systems by Muhammad Imran Sarwar, Muhammad Waseem Iqbal, Tahir Alyas, Abdallah Namoun, Ahmed Alrehaili, Ali Tufail, Nadia Tabassum

    Published 2021-01-01
    “…The suggested cost-effective framework can be easily integrated into AIS and ERP systems to identify data breaches.…”
    Get full text
    Article
  10. 310

    PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks by Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim

    Published 2024-01-01
    “…The reported increasing rate of data breaches through vehicular networks by Distributed Denial of Service (DDoS) type of intrusion creates concern for such networks. …”
    Get full text
    Article
  11. 311

    Ensemble Synthesized Minority Oversampling-Based Generative Adversarial Networks and Random Forest Algorithm for Credit Card Fraud Detection by Fuad A. Ghaleb, Faisal Saeed, Mohammed Al-Sarem, Sultan Noman Qasem, Tawfik Al-Hadhrami

    Published 2023-01-01
    “…Most credit card frauds are conducted online by illegally obtaining payment credentials through data breaches, phishing, or scamming. Many solutions have been suggested to address the credit card fraud problem for online transactions. …”
    Get full text
    Article
  12. 312

    Billiard based optimization with deep learning driven anomaly detection in internet of things assisted sustainable smart cities by P. Manickam, M. Girija, S. Sathish, Khasim Vali Dudekula, Ashit Kumar Dutta, Yasir A.M. Eltahir, Nazik M.A. Zakari, Rafiulla Gilkaramenthi

    Published 2023-11-01
    “…An anomaly detection system helps to identify possible data breaches or cyber-attacks by identifying abnormal data patterns. …”
    Get full text
    Article
  13. 313

    Network security framework for Internet of medical things applications: A survey by Tarish Hiba A., Hassan Rosilah, Ariffin Khairul Akram Zainol, Jaber Mustafa Musa

    Published 2024-04-01
    “…Therefore, network security is critical in IoMT applications due to data breaches, vulnerabilities, and distributed denial of service attacks on medical data. …”
    Get full text
    Article
  14. 314

    State of the Art in Adoption of Contact Tracing Apps and Recommendations Regarding Privacy Protection and Public Health: Systematic Review by Kolasa, Katarzyna, Mazzi, Francesca, Leszczuk-Czubkowska, Ewa, Zrubka, Zsombor, Péntek, Márta

    Published 2021-06-01
    “…The least often implemented criteria were provisions of information about personal data breaches and data gathered from children. The balance between standards of data protection and public health benefits was achieved best by the COVIDSafe app and worst by the Alipay Health Code app. …”
    Get full text
    Article
  15. 315

    P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks by Sokolova, Marina, El Emam, Khaled, Arbuckle, Luk, Neri, Emilio, Rose, Sean, Jonker, Elizabeth

    Published 2012-07-01
    “…In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health information custodians. Automated PHI detection tools that crawl the P2P networks can identify PHI and alert custodians. …”
    Get full text
    Article
  16. 316

    A review of Blockchain Technology applications for financial services by Mohd Javaid, Abid Haleem, Ravi Pratap Singh, Rajiv Suman, Shahbaz Khan

    Published 2022-07-01
    “…Credit reports significantly impact the financial lives of customers. Recent data breaches demonstrate the superior security of blockchain-based credit reporting over conventional server-based reporting. …”
    Get full text
    Article
  17. 317

    Deep learning approach to security enforcement in cloud workflow orchestration by Hadeel T. El-Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib, Khaled Khalil

    Published 2023-01-01
    “…Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-tenancy, loss of control over data and trust. …”
    Get full text
    Article
  18. 318

    A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation by Leming Zhou, Robert Thieret, Valerie Watzlaf, Dilhari DeAlmeida, Bambang Parmanto

    Published 2019-06-01
    “…However, because of frequently reported health data breaches, many people may hesitate to use telehealth-based health care services. …”
    Get full text
    Article
  19. 319

    A Framework of the Critical Factors for Healthcare Providers to Share Data Securely Using Blockchain by Ahmed G. Alzahrani, Ahmed Alhomoud, Gary Wills

    Published 2022-01-01
    “…Poor security, which increases data breaches, endangers patients both mentally, socially, and financially. …”
    Get full text
    Article
  20. 320