Keywords: امنیت داده ها; Data at rest; Cloud storage; Insider threat; Encryption; Data security;
مقالات ISI امنیت داده ها (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت داده ها; Data protection; Data security; Cybercrime; Cybersecurity; Cyber-resilience; Computer intrusions; Ethical hacking; Network and information security; Penetration Testing; Red Team;
Keywords: امنیت داده ها; clinical database; data security; institutional review board; quality improvement; technical platforms; EMR; electronic medical record; IRB; institutional review board; IT; information technology; PHI; protected health information; RDBMS; relational datab
Keywords: امنیت داده ها; Tanzania; Maternal health; Pregnancy; Community health workers; Mobile health; mHealth; Data security; Qualitative;
Keywords: امنیت داده ها; Data security; Distributed shielded execution; Secure enclaves;
Keywords: امنیت داده ها; Steganographic method; Chaotic map; Data security; Imperceptibility;
Keywords: امنیت داده ها; Cryptographic key generation; Biometric-based security; Data security; Bio-crypto system; Information forensics security;
Keywords: امنیت داده ها; Data breach notification; Data protection; Data security; Australia; European Union; GDPR; US; FTC;
Keywords: امنیت داده ها; Cloud; Data security; Access control; Attribute-based encryption; Access policy management;
Keywords: امنیت داده ها; Industrial communication; Communication system security; Data security; Power grids; Smart grid; Power system security; Privacy;
Keywords: امنیت داده ها; Cloud storage; Cloud storage auditing; Privacy preserving; Data security;
Keywords: امنیت داده ها; Data security; Public-key encryption; Non-malleability; Selective opening attack;
Keywords: امنیت داده ها; Cloud computing; Co-residence attack; Data corruption, data partition; Data reliability; Data security; Data theft; Virtual machine;
Keywords: امنیت داده ها; Electric vehicle; Power system dispatch; Demand-side participation; Real-time dispatch; Mobile app; Data security;
Keywords: امنیت داده ها; Data leakage detection; Data leakage prevention; Data security; DLPSs; Leaking channels; Content analysis
Keywords: امنیت داده ها; Data security; Information security; Baseline security; Security profile; SME
Keywords: امنیت داده ها; Data security; patient privacy; HIPAA; PHI;
Keywords: امنیت داده ها; Cloud; CDs; IHE; data security; inappropriate utilization;
Keywords: امنیت داده ها; Authenticated encryption; Second-order cellular automatons; Data security
Keywords: امنیت داده ها; Data security; Data sharing; Privacy-preserving; Attribute-based encryption; Scalability; Cloud computing
Keywords: امنیت داده ها; Cloud service provider (CSP); Business process management (BPM); Business process modeling (BPMN); Cloud computing; Data security
Keywords: امنیت داده ها; Image deduplication; Cloud storage provider; Data security; SPIHT image compression algorithm; Image hashing; Partial encryption
Keywords: امنیت داده ها; Data security; Identity-based proxy re-encryption; IBE; IBBE
Keywords: امنیت داده ها; Breast ultrasound; Computer-aided diagnosis; Data security; Segmentation; Watermarking
Keywords: امنیت داده ها; Data security; Cloud storage; Data storage policy; Data storage verification; Datacenter geographic location; Privacy
Keywords: امنیت داده ها; Data security; Cyber security; Authentication; Two-factor; Multi-factor; Data protection; Data privacy
Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption
Keywords: امنیت داده ها; Optical communication; Signal processing; Orthogonal frequency-division multiplexing (OFDM); Field programmable gate array (FPGA); Digital chaos; Data security;
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs
Keywords: امنیت داده ها; Data security; Selective opening security for receivers; Chosen-ciphertext attacks; Hybrid encryption; Ideal cipher model;
Exploring Data Security Issues and Solutions in Cloud Computing
Keywords: امنیت داده ها; Cloud Computing; Data Security; Cloud Services; Confidentiality; Integrity; Availability; Authentication; Access Control;
Bump in the wire (BITW) security solution for a marine ROV remote control application
Keywords: امنیت داده ها; BITW; AES; FPGA; ROV; Marine control; Data security;
A comparative analysis of VLSI trusted virtual sensors
Keywords: امنیت داده ها; Virtual sensors; Data security; Hardware security; Authenticated ciphers; Piecewise linear approximation; CMOS Integrated circuits.;
Gemini: Guest-transparent honey files via hypervisor-level access redirection
Keywords: امنیت داده ها; Data security; System security; Virtualization; Access control; Moving target defense;
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
Keywords: امنیت داده ها; Attribute based encryption; Hidden policy; Decryption outsourcing; Cloud computing; Privacy; Data security;
IoT security: Review, blockchain solutions, and open challenges
Keywords: امنیت داده ها; IoT security; Blockchain; IoT protocols; Network security; Data security;
IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues
Keywords: امنیت داده ها; Underground mines communication; Space mining; Internet of Things; Sensors network; Cyber attack; Blockchain; Security by design; Communication security; Cloud computing; Data security; Data logger;
Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data
Keywords: امنیت داده ها; Data security; Transmission of information; Hybrid cryptography; DNA based steganography; Playfair cipher; Conservative mutations;
Efficacy of Data Security in Managing the Database of SIMMAG 3D System
Keywords: امنیت داده ها; SIMMAG 3D; database; data security; decision support systems;
Parametric comparison of EMDS algorithm with some symmetric cryptosystems
Keywords: امنیت داده ها; EMDS; Algorithm; Data security; Encryption; Decryption; Reduce cipher; Throughput;
Experimental analyses of the K-hidden algorithm
Keywords: امنیت داده ها; Data security; Privacy protection; Negative database; SAT solver;
External integrity verification for outsourced big data in cloud and IoT: A big picture
Keywords: امنیت داده ها; Cloud computing; Data security; Big data; Internet of Things; Integrity verification; Public auditing
SECO: Secure and scalable data collaboration services in cloud computing
Keywords: امنیت داده ها; Data collaboration; Data security; HIBE; One-to-many encryption; Cloud computing
PPFSCADA: Privacy preserving framework for SCADA data publishing
Keywords: امنیت داده ها; Privacy preservation; Data publishing; Data security; SCADA; Internet
Privacy-preserving Kruskal-Wallis test
Keywords: امنیت داده ها; Data security; Statistical test; Kruskal-Wallis test;
A middleware approach for outsourcing data securely
Keywords: امنیت داده ها; Data security; Outsourcing; Data management; Middleware; Secure indexes;
Optimal univariate microaggregation with data suppression
Keywords: امنیت داده ها; Data security; Privacy; Disclosure control; Microaggregation; Dynamic programming
The 2012 CLSR-LSPI seminar on privacy, data protection & cyber-security – Presented at the 7th international conference on Legal, Security and Privacy Issues in IT law (LSPI) October 2–4, 2012, Athens
Keywords: امنیت داده ها; Cyber-privacy; Data security; Data abuse; Function-creep; Privacy regulation; Surveillance society; Privacy by design; Social media privacy; Cyber-crime
Singapore's Personal Data Protection legislation: Business perspectives
Keywords: امنیت داده ها; Singapore Personal Data Protection Act 2012; Personal data; Data sharing; Data intermediaries; Data transfer; Data security; Cloud computing
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Keywords: امنیت داده ها; Biometrics; Applied cryptography; Encryption; Authentication; Chaff generation; Data security
Wi-Fi protected access for secure power network protection scheme
Keywords: امنیت داده ها; Power network; Protection; Wireless communication; Wi-Fi protocol; Data security; Experimental investigation
Equally contributory privacy-preserving k-means clustering over vertically partitioned data
Keywords: امنیت داده ها; Privacy-preserving distributed data mining; k-means clustering; Data security