Showing 1 - 20 of 209,880

1

Balancing Secrecy and Transparency in Bug Bounty Programs.
Telang, Rahul ; Hydari, Muhammad Zia
Communications of the ACM. Aug2025, Vol. 68 Issue 8, p20-23. 4p.

COMPUTER hackers COMPUTER security vulner... ORGANIZATIONAL transpare... COMPUTER ethics INTERNET security COMPUTER security laws
Journal
Save to List
2

EU protection requirements for ePortfolios in clinical healthcare education.
Embo M ; Wasiak C ; Verschaeve S ; et al.
Publisher: BioMed Central Country of Publication: England NLM ID: 101088679 Publication Model: Electronic Cited Medium: Internet ISSN: 1472-6920 (Electronic) Linking ISSN: 14726920 NLM ISO Abbreviation: BMC Med Educ Subsets: MEDLINE

Humans European Union Computer Security legisl... Computer Security standa... Confidentiality legislat... Education, Medical legis...
Academic journal
Save to List
3

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

COMPUTER security vulner... SUPPLY chains STATISTICAL correlation COMPUTER software develo... COMPUTATIONAL complexity
Academic journal
Save to List
4

Novelty detection framework for monitoring connected vehicle systems with imperfect data.
Badfar, M. ; Yildirim, M. ; Chinnam, R.B.
International Journal of Production Research. Sep2025, Vol. 63 Issue 18, p6690-6703. 14p.

ANOMALY detection (Compu... BATTERY management syste... SCIENTIFIC observation MISSING data (Statistics... INTELLIGENT transportati...
Academic journal
Save to List
5

An adaptive online learning scheme for anomaly detection in IIoT data streams under varying operating conditions.
Li, Yuxuan ; He, Zhen ; He, Yingdong ; et al.
International Journal of Production Research. Oct2025, p1-27. 27p. 10 Illustrations.

CYBER physical systems BAYESIAN analysis ANOMALY detection (Compu... ENSEMBLE learning DIMENSIONAL reduction al... MACHINE learning
Academic journal
Save to List
6

Strategic Guidelines for Responding to a Healthcare Cyber-Attack.
Marler R ; Sherer M ; Thompson K ; et al.
Publisher: Lippincott Williams & Wilkins Country of Publication: United States NLM ID: 1263116 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1539-0721 (Electronic) Linking ISSN: 00020443 NLM ISO Abbreviation: J Nurs Adm Subsets: MEDLINE

Humans Guidelines as Topic Leadership United States Computer Security standa... Nurse Administrators edu...
Academic journal
Save to List
7

Characterization of Secure Message Use in a Children's Hospital.
DeChalus A ; Luo B ; Khan A ; et al.
Publisher: American Academy of Pediatrics Country of Publication: United States NLM ID: 101585349 Publication Model: Print Cited Medium: Internet ISSN: 2154-1671 (Electronic) Linking ISSN: 21541671 NLM ISO Abbreviation: Hosp Pediatr Subsets: MEDLINE

Humans Child Text Messaging statistic... Hospitals, Pediatric sta... Computer Security statis...
Academic journal
Save to List
8

Data Compliance Utilization Method Based on Adaptive Differential Privacy and Federated Learning.
Kang H ; Wu B ; Zhang C
Publisher: World Scientific Pub. Co Country of Publication: Singapore NLM ID: 9100527 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1793-6462 (Electronic) Linking ISSN: 01290657 NLM ISO Abbreviation: Int J Neural Syst Subsets: MEDLINE

Humans Federated Learning Privacy Computer Security Machine Learning Blockchain
Academic journal
Save to List
9

Security practices and insider threats in Spanish healthcare centers: a survey-based risk assessment.
Herrera Montano I ; Góngora Alonso S ; Sañudo García S ; et al.
Publisher: Elsevier Science Ireland Ltd Country of Publication: Ireland NLM ID: 9711057 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1872-8243 (Electronic) Linking ISSN: 13865056 NLM ISO Abbreviation: Int J Med Inform Subsets: MEDLINE

Spain Humans Cross-Sectional Studies Risk Assessment Surveys and Questionnair... Male
Academic journal
Save to List
10

Raw event-based adversarial attacks for Spiking Neural Networks with configurable latencies.
Du X ; Shi W ; Zhao X ; et al.
Publisher: Pergamon Press Country of Publication: United States NLM ID: 8805018 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-2782 (Electronic) Linking ISSN: 08936080 NLM ISO Abbreviation: Neural Netw Subsets: MEDLINE

Humans Algorithms Neural Networks, Compute... Computer Security Action Potentials physio...
Academic journal
Save to List
11

Band-aids and firewalls: A resource-based view of ransomware attack vulnerability in health care organizations.
Bidoki MZ ; Heath ML ; Silvera GA
Publisher: Lippincott Williams & Wilkins Country of Publication: United States NLM ID: 7611530 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1550-5030 (Electronic) Linking ISSN: 03616274 NLM ISO Abbreviation: Health Care Manage Rev Subsets: MEDLINE

Humans United States Logistic Models Computer Security Health Facilities
Academic journal
Save to List
12

MSG: Stealing data from pruned neural networks via malicious sparsity guidance.
Shang J ; Wang J ; Wang K ; et al.
Publisher: Pergamon Press Country of Publication: United States NLM ID: 8805018 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-2782 (Electronic) Linking ISSN: 08936080 NLM ISO Abbreviation: Neural Netw Subsets: MEDLINE

Humans Neural Networks, Compute... Machine Learning Algorithms Computer Security
Academic journal
Save to List
13

A novel gradient inversion attack framework to investigate privacy vulnerabilities during retinal image-based federated learning.
Nielsen C ; Wilms M ; Forkert ND
Publisher: Elsevier Country of Publication: Netherlands NLM ID: 9713490 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1361-8423 (Electronic) Linking ISSN: 13618415 NLM ISO Abbreviation: Med Image Anal Subsets: MEDLINE

Humans Neural Networks, Compute... Federated Learning Deep Learning Retina diagnostic imagin... Machine Learning
Academic journal
Save to List
14

Enhancing business continuity with expert insights: Lessons from a large-scale cyber resilience simulation.
Desmeules PP ; Laberge M ; Tassé-Gagné P
Publisher: Henry Stewart Publications Country of Publication: England NLM ID: 101509784 Publication Model: Print Cited Medium: Print ISSN: 1749-9216 (Print) Linking ISSN: 17499216 NLM ISO Abbreviation: J Bus Contin Emer Plan Subsets: MEDLINE

Humans Disaster Planning organi... Commerce organization &... Computer Security Risk Management organiza...
Academic journal
Save to List
15

ESTRO framework for radiation oncology departments to mitigate against cyberattacks.
Peters S ; O'Donovan A ; Bellini M ; et al.
Publisher: Elsevier Scientific Publishers Country of Publication: Ireland NLM ID: 8407192 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-0887 (Electronic) Linking ISSN: 01678140 NLM ISO Abbreviation: Radiother Oncol Subsets: MEDLINE

Humans Patient Safety Computer Security Radiation Oncology organ... Radiation Oncology stand...
Academic journal
Save to List
16

IDMM-IDS: An efficient and robust intrusion detection system for the IoT based on the inverted Dirichlet mixture model.
He W ; Cai X ; Yu Y ; et al.
Publisher: Pergamon Press Country of Publication: United States NLM ID: 8805018 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-2782 (Electronic) Linking ISSN: 08936080 NLM ISO Abbreviation: Neural Netw Subsets: MEDLINE

Algorithms Humans Stochastic Processes Internet of Things Computer Security Neural Networks, Compute...
Academic journal
Save to List
17

Ethical, data security, and resource allocation considerations in AI integration for healthcare during Hajj: task force insights and future directions.
Sulaiman KA ; Alharthi AF ; Alqahtani R ; et al.
Publisher: Elsevier Science Ireland Ltd Country of Publication: Ireland NLM ID: 9711057 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1872-8243 (Electronic) Linking ISSN: 13865056 NLM ISO Abbreviation: Int J Med Inform Subsets: MEDLINE

Humans Saudi Arabia Advisory Committees COVID-19 Artificial Intelligence... Computer Security ethics
Academic journal
Save to List
18

Dormant key: Unlocking universal adversarial control in text-to-image models.
Hu J ; Li L ; Wu H ; et al.
Publisher: Pergamon Press Country of Publication: United States NLM ID: 8805018 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-2782 (Electronic) Linking ISSN: 08936080 NLM ISO Abbreviation: Neural Netw Subsets: MEDLINE

Humans Algorithms Computer Security Neural Networks, Compute...
Academic journal
Save to List
19

Society of Family Planning Research Practice Support: Digital and data security for abortion research in a post-Dobbs era-A primer for qualitative researchers.
Madera M ; Bennett A ; Bertash K ; et al.
Publisher: Elsevier Country of Publication: United States NLM ID: 0234361 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-0518 (Electronic) Linking ISSN: 00107824 NLM ISO Abbreviation: Contraception Subsets: MEDLINE

Female Humans Pregnancy Confidentiality Family Planning Services Qualitative Research
Academic journal
Save to List
20

Robust deepfake detector against deep image watermarking.
Yu J ; Liu X ; Zan F ; et al.
Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE

Algorithms Humans Computer Security Image Processing, Comput...
Academic journal
Save to List

Filter