Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things

S Kerimkhulle, Z Dildebayeva, A Tokhmetov, A Amirova… - Symmetry, 2023 - mdpi.com
This article addresses the issue of information security in the Industrial Internet of Things
(IIoT) environment. Information security risk assessment in the IIoT is complicated by several …

A model of sustainable information security management system in higher education institutions

L Sikman, T Latinovic, N Sarajlic… - Journal of Physics …, 2023 - iopscience.iop.org
Modern business systems have the expectations and requirements of users and
stakeholders for safer and better services that are constantly growing. The increasing use of …

Integrating big data collaboration models: advancements in health security and infectious disease early warning systems

J Cui, Y Deng, Q Hao - International Journal of Data Mining …, 2024 - inderscienceonline.com
In order to further improve the public health assurance system and the infectious diseases
early warning system to give play to their positive roles and enhance their collaborative …

Internet of Things and Fuzzy Logic based Smart Balcony Plant Care System from a Renewable Resources

J Simon - Interdisciplinary Description of Complex Systems …, 2024 - hrcak.srce.hr
Sažetak This article proposes a smart irrigation system that helps to maintain a balcony
plants. The system provides real-time information about the environmental parameters as …

Cryptographic analysis and construction of complete permutations using a recursive approach

S Xiang, Y Tang, Y Tong… - International Journal of …, 2024 - inderscienceonline.com
This paper proposes a novel recursive approach for constructing generalised complete
permutations over finite fields and analyses their cryptographic properties. The method can …

FLOOD VULNERABILITY ASSESSMENT AND EVACUATION PLANNING FOR RURAL POPULATIONS IN ANHUI PROVINCE, CHINA USING ANLYTIC HIERARCHY …

Z Liu, Y Dai - Environmental Engineering & Management …, 2023 - search.ebscohost.com
This study develops flood vulnerability assessment and evacuation planning for rural
villages in Anhui Province, China. This study performed flood vulnerability assessment using …

Information Security Investments: How to Prioritize?

MB Oliveira, A Goldman, J Yoder - … of the 20th Brazilian Symposium on …, 2024 - dl.acm.org
Context: In an increasingly digitalized world with more complex supply chains, there is
concern about the security of sharing information. To highlight the associated risk …

Simulación de un modelo de tecnología blockchain para garantizar la seguridad de la información del proceso de admisión de una universidad pública del Perú

OA Gutierrez Baracco, JA Lujan Alfaro - 2023 - repositorio.utp.edu.pe
La presente investigación consiste en la simulación de un modelo de tecnología Blockchain
para garantizar la seguridad de la información en un proceso de admisión de una …