IT Governance impact on academic performance development

R Tawafak, A Romli, S Malik, M Shakir - International Journal of …, 2020 - learntechlib.org
This paper produces a comprehensive literature review to evaluate the impact of technology
development with IT governance mechanism for enhancing academic performance. This …

CHAIN: cyber hierarchy and interactional network enabling digital solution for battery full-lifespan management

S Yang, R He, Z Zhang, Y Cao, X Gao, X Liu - Matter, 2020 - cell.com
With the ever-growing need from the electric transportation industry, lithium-ion batteries are
the systems of choice, offering high energy density, flexible and lightweight design, and …

[HTML][HTML] Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique

A Kousalya, N Baik - International Journal of Intelligent Networks, 2023 - Elsevier
In the current era, numerous products are accessible online from anywhere and every
minute. This work used encryption with access management because authenticities …

Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review

T Ali, M Al-Khalidi, R Al-Zaidi - Journal of Computer Information …, 2024 - Taylor & Francis
Cloud computing faces more security threats, requiring better security measures. This paper
examines the various classification and categorization schemes for cloud computing security …

[PDF][PDF] Enhancing Security with Multi-Factor User Behavior Identification Via Longest Common Subsequence Analysis

B Shannaq, M Shakir - Informatica, 2024 - researchgate.net
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v48i19.6270
Informatica 48 (2024) 57–72 57 Enhancing Security with Multi-Factor User Behavior Identification …

Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS)

B Shannaq, MT Shakir - Informatica, 2024 - informatica.si
The proposed approach comprises a set of strategies and tools to protect user-sensitive
data, such as passwords, from unauthorized access, misuse, or loss. It aims to identify …

The convergence between big data and the cloud: A review

LA Rahman, ME Rana - … on Data Analytics for Business and …, 2021 - ieeexplore.ieee.org
With the increased growth in scale and complexity of data, it is becoming more difficult for
companies to maintain, manage and process their data to extract value using traditional …

Patch management planning-towards one-to-one policy

V Markkanen, T Frantti - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Software security is a key component in protecting an enterprise's digital and operational
infrastructure. Time from vulnerability disclosure to exploitation is decreasing and a large …

[PDF][PDF] Plataforma y aplicación móvil para proporcionar información del transporte público utilizando un dispositivo embebido de bajo costo

J Buele, FL Salazar, S Altamirano… - Revista Ibérica de …, 2019 - researchgate.net
En este proyecto se presenta el desarrollo de un sistema informativo de transporte público
urbano, para mejorar la movilidad de los usuarios. Este sistema consta de una pantalla …

[PDF][PDF] Teleoperation and remote monitoring of a SCORBOT ER-4U robotic arm in an academic environment

L Franklin Salazar, J Buele, HJ Velasteguí… - … Journal of Innovative …, 2019 - researchgate.net
The present research work develops a system that uses a programming method
implemented for tele-operation of a ScorBot ER-4U. Its objective is remote control by a …