-
161
Blockchain-based security for cloud data storage.
Published 2023“…The focus to address in this project is the vulnerability of cloud data storage systems to cyber-attacks and data breaches. The design and implementation of a proof-of-concept blockchain-based data storage system, and an evaluation of the system’s security and performance will be presented. …”
Conference or Workshop Item -
162
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Published 2023-08-01“…CC introduces new vulnerabilities, including unauthorized access, data breaches, and insider threats. The shared infrastructure of cloud systems makes them attractive targets for attackers. …”
Get full text
Article -
163
An enhanced next generation security operation center framework for information system security management
Published 2023“…They boost a company's ability to fight against hackers, financial losses, and data breaches when deploy successfully.…”
Get full text
Thesis -
164
Data encryption for bank management system
Published 2022-12-01“… Data breaches are perhaps the single most significant risk that banks face today. …”
Get full text
Article -
165
Pragmatic Approach for Online Document Verification Using Block-Chain Technology
Published 2022-01-01“…When there is a security risk, block chain comes to mind. When it comes to data breaches, education is also not far away. For attackers, student data with little financial information has become a valuable commodity. …”
Get full text
Article -
166
Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art
Published 2023-01-01“…In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks are performed and focused on the vulnerabilities related to web applications. …”
Get full text
Article -
167
JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism
Published 2023-12-01“…Identifying and addressing security vulnerabilities in a timely manner is crucial to prevent hacking and data breaches. Unfortunately, current vulnerability identification methods, including classical and deep learning-based approaches, exhibit critical drawbacks that prevent them from meeting the demands of the contemporary software industry. …”
Get full text
Article -
168
Are the coronavirus disease 2019 (COVID-19)-themed applications launched during the pandemic sustainable?
Published 2022-09-01“…This is necessary considering the potential dangers arising from App inaccuracies, as well as the potential misuse of user data due to data breaches. With these considerations in mind, we consider that the vaccine passport is an App with a COVID-19 theme that must be refined and applied sustainably amid the ongoing global crisis and the uncertainty of this pandemic.…”
Get full text
Article -
169
Encryption and the Loss of Patient Data
Published 2013“…This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. …”
Get full text
Get full text
Article -
170
Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security
Published 2016-06-01“…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
Get full text
Article -
171
Role of IoT in protecting wearable gadgets
Published 2022-04-01“…However, the IoT also brings along a huge flow of privacy and security concerns whilst considering the huge inflow of data breaches and cyberattacks in the network data. The advancements in the security protocols of the data thus bring along a mistrust among the users of IoT networks who might then no longer wish to be a part of this technological revolution. …”
Get full text
Article -
172
How can we know what the public think about administrative data research
Published 2018-06-01“…The views of publics are not homogenous, static and also respond to news headlines and data breaches and we can never know the views of 65 million people across the UK, so why do we worry so much about the views of the public and how can we ever know what publics think? …”
Get full text
Article -
173
Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security
Published 2016-06-01“…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
Get full text
Article -
174
Cybersecurity Risks in a Pandemic
Published 2020-09-01“…This is especially problematic given that 90% of health care providers had already encountered data breaches. Companies must implement well-defined software upgrade procedures, should use secure networks like virtual local area networks, and conduct regular penetration tests of their systems. …”
Get full text
Article -
175
Taxonomy of SQL Injection: ML Trends & Open Challenges
Published 2023“…During these attacks, malicious SQL statements are injected into input fields of data-driven systems, leading to unauthorized access and data breaches. Consequently, a need is generated to understand the nature of the attacks, detection, and effective prevention techniques. …”
Get full text
Get full text
Conference or Workshop Item -
176
An exploratory study of private companies in Malaysia: critical success factors for enterprise IT risk management
Published 2023“…However, this reliance exposes organizations to various IT-related risks, including data breaches, system vulnerabilities, and regulatory non-compliance. …”
Get full text
Conference or Workshop Item -
177
Blockchain and the Tokenization of the Individual: Societal Implications
Published 2019-10-01“…Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures. …”
Get full text
Article -
178
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Published 2024-01-01“…However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. …”
Get full text
Article -
179
Demonstration of quantum-digital payments
Published 2023-06-01“…Similarly to banknotes, they should be easy to use, unique, tamper-resistant and untraceable, but additionally withstand digital attackers and data breaches. Current technology substitutes customers’ sensitive data by randomized tokens, and secures the payment’s uniqueness with a cryptographic function, called a cryptogram. …”
Get full text
Article -
180
Behavioral recommendation engine driven by only non-identifiable user data
Published 2023-03-01“…Even though it seems favorable, security risks like data breaches are inevitable. This research proposes a novel reinforcement learning ‘approach’ to recommend users without collecting identifiable data. …”
Get full text
Article