Applications of blockchain technology in clinical trials: review and open challenges

IA Omar, R Jayaraman, K Salah, I Yaqoob… - Arabian Journal for …, 2021 - Springer
Blockchain technology has disclosed unprecedented opportunities in the healthcare sector
by unlocking the true value of interoperability. Specifically, the striking features of blockchain …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

Empirical evaluation of a cloud computing information security governance framework

O Rebollo, D Mellado, E Fernández-Medina… - Information and …, 2015 - Elsevier
Context Cloud computing is a thriving paradigm that supports an efficient way to provide IT
services by introducing on-demand services and flexible computing resources. However …

A Framework for the Governance of Information Security: Can it be Used in an Organization

GS Antoniou - SoutheastCon 2018, 2018 - ieeexplore.ieee.org
The purpose of this research paper was to test the validity of the research Information
Security Governance Framework developed by Posthumus and Solms (2004) seminal …

Marco para el Gobierno de la Seguridad de la Infornación en servicios Cloud Computing.

OR Martínez - 2014 - dialnet.unirioja.es
El modelo de servicios Cloud Computing ha surgido como una alternativa real con la que
atender la demanda de la industria de las Tecnologías de la Información y las …

Complexity-based graph attention network for metamorphic malware detection

K Brezinski - 2024 - mspace.lib.umanitoba.ca
This thesis work presents a new approach to malware analysis by creating a specialized
sandbox environment for executing and monitoring malware on a host operating system …

[图书][B] IT-Sicherheitsanalysen: ein prozessorientiertes Vorgehensmodell

D Simic - 2017 - books.google.com
Die etablierten Verfahren zur Durchführung von IT-Sicherheitsanalysen beziehen sich im
Regelfall auf technische Systeme. Dieses Vorgehen ist mit einem vertretbaren Aufwand …

Inadequacy of Risk Acceptance Criteria for Cloud Services Adoption: A Qualitative Generic Study

JB Anderson - 2021 - search.proquest.com
The shift in business operations, competitions, and the growing trends in information
technology influences the adoption of cloud computing technology. The cost advantages …

Introducing a security governance framework for cloud computing

O Rebollo, D Mellado… - … Workshop on Security in …, 2013 - scitepress.org
The cloud computing paradigm provides a more efficient way in which to provide IT services,
introducing on-demand services and flexible computing resources. The adoption of these …

[PDF][PDF] Using an Accurate Multimodal Biometric for Human Identification System via Deep Learning

SA Tuama, JH Saud, ZA Alobaidy - Al-Mansour Journal, 2022 - iasj.net
Biometric systems for automated identification of an individual rely on behavioral or
physiological variables linked with the individual. Biometric systems function in two modes …