Transparent control of access invoking real-time analysis of the query history

H Plattner, MP Schapranow - US Patent 9,015,812, 2015 - Google Patents
2013-06-28 Assigned to HASSO-PLATTNER-INSTITUT FUR SOFTWARESYSTEMTECHNIK
GMBH reassignment HASSO-PLATTNER-INSTITUT FUR SOFTWARESYSTEMTECHNIK …

Antimalarial Activity of Nigella sativa L. Seed Extracts and Selection of Resistance in Plasmodium berghei ANKA in a Mouse Model

R Udu, J Oyweri, J Gathirwa - Journal of Pathogens, 2021 - Wiley Online Library
Background. Chemotherapy plays a crucial role in malaria control. However, the main
obstacle to treatment has been the rise of parasite resistance to most antimalarial drugs …

Students selection for university course admission at the joint admissions board (kenya) using trained neural networks

F Wabwoba, FM Mwakondo - Journal of Information Technology …, 2011 - learntechlib.org
Abstract Every year, the Joint Admission Board (JAB) is tasked to determine those students
who are expected to join various Kenyan public universities under the government …

Security-aware web service composition approaches: State-of-the-art

H Movahednejad, SB Ibrahim, M Sharifi… - Proceedings of the 13th …, 2011 - dl.acm.org
Nowadays service composition has been received lots of attentions considering the fact that
no single service can satisfy users' desires in the majority of service oriented scenarios. In …

A Robust Context and Role-Based Dynamic Access Control for Distributed Healthcare Information Systems

AA Adamu, AO Salau, L Zhiyong - Internet of Things, 2021 - api.taylorfrancis.com
Access control (AC) in healthcare systems is a growing concern in healthcare informatics,
which has received a lot of attention over the past decade. However, not much progress has …

Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

OS Ogunseye, O Folorunso, J Zhang - International Journal of E …, 2011 - igi-global.com
Insider attack and espionage on computer-based information is a major problem for
business organizations and governments. Knowledge Management Systems (KMSs) are not …

A Fuzzy Multi-Criteria Decision-Making Method for Managing Network Security Risk Perspective

SA Khan, W Khan, D Pandey - Cloud-Based Big Data Analytics in …, 2021 - igi-global.com
Security threats evaluation accepts a pivotal part in network security management. In this
chapter, the author has depicted the significant measures and parameters with respect to …

[PDF][PDF] PREDICTING STUDENT'S MOST PREFERRED UNIVERSITY USING ARTIFICIAL NEURAL NETWORK

OB Alaba, A Oluwatobi - researchgate.net
Machine learning techniques have proved in time past to be very efficient in predicting
phenomena with non-linear relationships. Based on the fact that Artificial Neural Networks …

[PDF][PDF] AN ADAPTIVE HIERARCHICAL ACCESS CONTROL ARCHITECTURE FOR ENTERPRISE NETWORK USING COMPLIANCE VARIANCE

AS Sodiya, AA Orunsolu - anale-informatica.tibiscus.ro
Enterprise networks are integral components of most modern day businesses especially in
today's high technology environment. The smart environment created by enterprise networks …

[PDF][PDF] Enforcing Privacy via Access Control and Data Perturbation

BE Jian Zhong - 2013 - Citeseer
We live in the information age, and personal information has become one of the most
valuable resources. This includes personal data (eg date of birth, address, age, gender etc.) …