Academic literature on the topic 'ICT Integration and Data Security and Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICT Integration and Data Security and Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ICT Integration and Data Security and Privacy"

1

UHIRIWE, ALICE, and Dushimimana Jean de Dieu DR. "EFFECT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON PROJECT PERFORMANCE. A CASE OF BUILDING RESILIENCE IN LEADING TEACHING AND LEARNING TOGETHER PROJECT (BRLTLT) IN KICUKIRO DISTRICT, RWANDA." International Journal of Social Science and Humanities Research 13, no. 2 (2025): 175–87. https://doi.org/10.5281/zenodo.15295160.

Full text
Abstract:
<strong>Abstract:</strong> This study dug into the interaction of Information Communication Technology (ICT) and project performance, specifically within the context of the "Building-Resilience in Leading Teaching and Learning Together Project" (BRLTLT) in Kicukiro district. The overarching objective was to assess the forthcoming impact of ICT on project performance in the Rwandan educational landscape. Specific objectives included the examination of the effect of ICT infrastructure, ICT integration, and data security and privacy on the project performance of BRLTLT in Kicukiro district. The major population of the study, which actively participate in the research, consists of instructors participating in the BRLTLT project in Kicukiro district, with a special focus on the 1,056 teachers in Kicukiro district. The study population was the BRLTLT project's 1,056 teachers in Kicukiro district was the focus and sample size, which was be 91 teachers, was calculated using Slovin's sample size calculation with a 10% margin of error. The researcher intended to use random selection to obtain multiple viewpoints, assuring representation from various backgrounds, teaching levels, and areas. Data was gathered through questionnaires designed to elicit in-depth responses from teachers who participated in the BRLTLT project, a documentary study involving relevant literature, and structured interviews to gain insights into trained teachers' creative practices and challenges. In anticipation of the data analysis to come, the researcher used inferential statistics, such a regression model, in conjunction with descriptive statistics, like frequencies, percentages, means, and standard deviations, to identify meaningful associations. Key Findings in Table 8: ICT Infrastructure and Project Performance show the results highlight a strong consensus on the importance of ICT infrastructure in project execution. Hardware reliability (mean = 4.9670) and networking infrastructure (mean = 4.9780) were rated highest, emphasizing their role in efficient data sharing and reduced downtime. The low standard deviations indicate consistent agreement, reinforcing that ICT infrastructure significantly enhances communication and project efficiency, Table 9: ICT Integration and Project Performance show ICT integration was perceived as comprehensive and effective (mean = 4.9780, SD = 0.20966), supporting workflow management, decision-making, and communication. However, integration across all project stages showed slight variations (SD = 0.69798), suggesting differences in experiences. Overall, results affirm ICT&rsquo;s critical role in efficiency and collaboration and Table 10: Data Security and Privacy in Project Performance indicates data security measures were highly valued, with mean scores above 4.86. Regular security audits (mean = 4.9011) and data encryption (mean = 4.9231) were seen as essential for safeguarding project information. The low standard deviations confirm a strong agreement on the importance of data protection in project efficiency. The study recommends that the BRLTLT project should invest in robust ICT infrastructure, enhance ICT integration, and strengthen data security to improve project performance. Regular monitoring and evaluation of ICT systems are essential. The Government of Rwanda should increase ICT investments in educational projects, ensuring equitable access to modern technology, especially in rural areas. <strong>Keywords:</strong><em> </em>Information Communication Technology (ICT), Project performance, ICT Infrastructure, ICT Integration and Data Security and Privacy. <strong>Title:</strong> EFFECT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON PROJECT PERFORMANCE. A CASE OF BUILDING RESILIENCE IN LEADING TEACHING AND LEARNING TOGETHER PROJECT (BRLTLT) IN KICUKIRO DISTRICT, RWANDA <strong>Author:</strong> UHIRIWE ALICE, DR. Dushimimana Jean de Dieu <strong>International Journal of Social Science and Humanities Research&nbsp; </strong> <strong>ISSN 2348-3156 (Print), ISSN 2348-3164 (online)</strong> <strong>Vol. 13, Issue 2, April 2025 - June 2025</strong> <strong>Page No: 175-187</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 28-</strong><strong>April-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.15295160</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effect-of-information-communication-technology-ict-on-project-performance-a-case-of-building-resilience-in-leading-teaching-and-learning-together-project-brltlt-in-kicukiro-district-rwanda</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Researcher. "BALANCING FUNCTIONALITY AND SECURITY: A FRAMEWORK FOR IOT SOFTWARE INTEGRATION WITH THIRD-PARTY SERVICES IN CRITICAL SECTORS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 263–79. https://doi.org/10.5281/zenodo.13970070.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT) ecosystem has led to an increased need for seamless integration between IoT software applications and third-party solutions across various industries. While offering significant benefits in terms of enhanced functionality and efficiency, this integration presents substantial challenges in maintaining robust security measures.&nbsp;This article explores the complexities of integrating IoT platforms with third-party services in smart cities, healthcare, and automotive sectors, focusing on ensuring secure authentication, authorization, and communications. We analyze the critical aspects of data privacy and security throughout the entire data lifecycle, from collection to deletion, in the context of IoT-third party integrations. The article addresses key challenges, such as scalability issues and potential security vulnerabilities introduced by these integrations. By examining case studies and current best practices, we propose a comprehensive framework for secure IoT integration that balances functionality with stringent security requirements. Our findings highlight the importance of robust API (Application Programming Interface) security, encryption protocols, and access control mechanisms in creating resilient IoT ecosystems. This article contributes to the growing body of knowledge on IoT security. It provides practical guidelines for organizations seeking to leverage third-party integrations while maintaining the integrity and confidentiality of their IoT platforms.
APA, Harvard, Vancouver, ISO, and other styles
3

Abdussalam, Ali Ahmed, Belrzaeg Mohamed, Nassar Yasser, J. El-Khozondar Hala, Khaleel Mohamed, and Alsharif Abdulgader. "A comprehensive review towards smart homes and cities considering sustainability developments, concepts, and future trends." World Journal of Advanced Research and Reviews 19, no. 1 (2023): 1482–89. https://doi.org/10.5281/zenodo.10335712.

Full text
Abstract:
The adoption of Smart Homes (SHs) and Smart Cities (SCs) brings numerous benefits to the society and environment by exploiting the Information communication technologies (ICTs). These include increased efficiency, reduced energy waste, lower utility bills, improved safety and security, enhanced mobility options, and a more sustainable and liveable urban environment using Vehicle-to-Grid (V2G) technology. Moreover, the integration of technology such Internet of Things (IoT) and data-driven solutions can lead to better decision-making, more responsive public services, and increased citizen engagement. However, there are challenges that need to be addressed for the full realization of smart homes and smart cities. These include concerns related to privacy, data security, interoperability of devices and systems, infrastructure investment, and ensuring equitable access to these technologies. Overcoming these challenges will require collaboration between policymakers, technology providers, urban planners, and citizens to create a framework that balances innovation, privacy, and sustainability. Despite the challenges, the potential benefits of smart homes and smart cities make them compelling solutions for the future. By leveraging technology to create more efficient, sustainable, and liveable spaces, smart homes and smart cities have the potential to significantly improve our everyday lives and contribute to a more prosperous and environmentally friendly future.
APA, Harvard, Vancouver, ISO, and other styles
4

Kumbo, Lazaro Inon, Deogratias Tasilo Mahuwi, Bernad Joseph Hayuma, Victor Simon Nkwera, Christopher Denis Ntyangiri, and Martin Ludovick Mushi. "Review of Blockchain Technology on Data Security and Privacy: Recommendations for Advancing Tanzania's ICT Sector." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 475–83. http://dx.doi.org/10.53982/ajerd.2024.0702.45-j.

Full text
Abstract:
The rapid growth of the ICT sector has led to increased global data exchange and innovation opportunities. The increased use of technology has brought about concerns regarding data security and privacy which triggered a rising interest in blockchain technology as a potential solution to security challenges. This research endeavours to comprehensively examine the influence of blockchain on data security and privacy inside and outside Tanzanian, filling the gap that exists. The blended approach was used to analyse blockchain's effects while focusing on ethical considerations. The review emphasizes the benefits of blockchain in enhancing data security, trust, and transparency, along with its various applications. The research highlights blockchain technology's potential to offer robust data protection and improve transparency while identifying the challenges that must be addressed for successful implementation. The study investigates the role of blockchain in securing information systems in global and Tanzanian settings, focusing on sectors such as healthcare, banking, education, and land registration. The study emphasises the significant potential of blockchain technology to impact various industries in Tanzania profoundly. It offers valuable insights for professionals, policymakers, and researchers, highlighting the need to investigate how blockchain can be applied explicitly within different sectors. Additionally, it suggests practical strategies for seamlessly integrating this technology, considering the unique challenges the Tanzanian ICT sector encounters.
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, Parmar, and Shah Parth. "Internet of things-blockchain integration: a robust data security approach for end-to-end communication." Internet of things-blockchain integration: a robust data security approach for end-to-end communication 32, no. 2 (2023): 1050–57. https://doi.org/10.11591/ijeecs.v32.i2.pp1050-1057.

Full text
Abstract:
The integration of internet of things (IoT) and blockchain technology has been proposed as a promising solution to address the challenges related to security, scalability, and privacy. This &nbsp;integration enables the creation&nbsp;of secure and decentralized systems &nbsp;that allow devices to interact with each otherand exchange data in a transparent &nbsp;and trustworthy manner. The&nbsp;significant research work has been carried out by researcher on IoT&nbsp;and blockchain integration to utilize their combine potential in smart applications. However, due to limitation and scope ofemerging technologies, it is essential to develop robust security frameworks that address the challenges and ensure the secure data communication from IoT node to blockchain network. IoT devices come up with constrained nature and limited security mechanisms along with weak access control policy. Our work includes heterogeneous IoT and blockchain ecosystem that senses and store data intelligently after proper validation with verification into decentralized distributed blockchain network. Our proposed work includes a robust approach to convey potential data security issue to protect &nbsp;end to end information with suitable&nbsp;authorization, access control policy, device to device data protection and data integrity specially when data moving from IoT devices to blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
6

Agbesanya, Dr Felicia Olufunke, Dr James Oladiipo Folorunso, and Dr Adedayo Adeniran Odunlami. "Adoption and Management of ICT in Schools: Strategies for the Administrators in Nigerian Tertiary Institution." International Journal of Research and Innovation in Social Science VIII, no. VII (2024): 2838–46. http://dx.doi.org/10.47772/ijriss.2024.807220.

Full text
Abstract:
It is no longer contestable that the emergence of Information Communication Technology (ICT) over the years has revolutionized all spheres of life. In the realm of education, appropriate utilization of ICTs has gradually altered the traditional teaching methods in most climes, thereby making teaching-learning more interesting and administrative work less complex. Nevertheless, the level of adoption of ICT in tertiary institution in Nigeria appear abysmally low resulting from factors resident in personnel and the education system. This paper therefore explores the spheres of ICT application in tertiary institutions of learning to include learning and teaching, research and collaboration, administrative efficiency, professional development among others. Constraints and considerations in adopting ICT were equally exposed to encompass data security and privacy concerns, technical challenges, poor implementation.Strategies for optimum adoption and integration of ICT by administrators of tertiary institutions in Nigeria. It was recommended among others that management should address the perennial problem of irregular power among others.
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." International Journal of Applied and Scientific Research 2, no. 2 (2024): 213–26. http://dx.doi.org/10.59890/ijasr.v2i2.1333.

Full text
Abstract:
The integration of cloud computing into the Information and Communication Technology (ICT) infrastructure of educational institutions is a transformative paradigm that holds significant implications for the efficiency and efficacy of academic processes. This paper explores the role of cloud computing in reshaping ICT infrastructure within educational settings. A comprehensive literature review establishes the current landscape of ICT in education, identifying challenges and limitations. The study delves into the theoretical foundations of cloud computing and investigates its potential benefits, including improved accessibility, scalability, and cost-effectiveness. Empirical evidence and case studies are presented to illustrate the transformative impact of cloud computing on educational ICT infrastructure. The discussion encompasses challenges and considerations, including data security and privacy concerns, and offers insights into the future directions of cloud computing in education. This research contributes to the ongoing dialogue surrounding technology in education and provides practical recommendations for harnessing the full potential of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
8

Ibrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions 2, Vol. 2 No. 2 (2024): February 2024 (2024): 14. https://doi.org/10.59890/ijasr.v2i2.1333.

Full text
Abstract:
The integration of cloud computing into the Information and Communication Technology (ICT) infrastructure of educational institutions is a transformative paradigm that holds significant implications for the efficiency and efficacy of academic processes. This paper explores the role of cloud computing in reshaping ICT infrastructure within educational settings. A comprehensive literature review establishes the current landscape of ICT in education, identifying challenges and limitations. The study delves into the theoretical foundations of cloud computing and investigates its potential benefits, including improved accessibility, scalability, and cost-effectiveness. Empirical evidence and case studies are presented to illustrate the transformative impact of cloud computing on educational ICT infrastructure. The discussion encompasses challenges and considerations, including data security and privacy concerns, and offers insights into the future directions of cloud computing in education. This research contributes to the ongoing dialogue surrounding technology in education and provides practical recommendations for harnessing the full potential of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
9

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
10

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ICT Integration and Data Security and Privacy"

1

Hu, Jun. "Privacy-Preserving Data Integration in Public Health Surveillance." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19994.

Full text
Abstract:
With widespread use of the Internet, data is often shared between organizations in B2B health care networks. Integrating data across all sources in a health care network would be useful to public health surveillance and provide a complete view of how the overall network is performing. Because of the lack of standardization for a common data model across organizations, matching identities between different locations in order to link and aggregate records is difficult. Moreover, privacy legislation controls the use of personal information, and health care data is very sensitive in nature so the protection of data privacy and prevention of personal health information leaks is more important than ever. Throughout the process of integrating data sets from different organizations, consent (explicitly or implicitly) and/or permission to use must be in place, data sets must be de-identified, and identity must be protected. Furthermore, one must ensure that combining data sets from different data sources into a single consolidated data set does not create data that may be potentially re-identified even when only summary data records are created. In this thesis, we propose new privacy preserving data integration protocols for public health surveillance, identify a set of privacy preserving data integration patterns, and propose a supporting framework that combines a methodology and architecture with which to implement these protocols in practice. Our work is validated with two real world case studies that were developed in partnership with two different public health surveillance organizations.
APA, Harvard, Vancouver, ISO, and other styles
2

Enríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.

Full text
Abstract:
La sécurité de l'information est étroitement liée au droit de protection des données, car une mise en œuvre inefficace de la sécurité peut entraîner des violations de données à caractère personnel. Le RGPD repose sur la gestion de risques pour la protection des droits et libertés des personnes concernées, ce qui signifie que la gestion de risques est le mécanisme de protection des droits fondamentaux. Cependant, l'état de l'art en matière de gestion des risques liés à la sécurité de l'information et de gestion des risques juridiques sont encore immatures. Malheureusement, l'état actuel de l'art n'évalue pas la multidimensionnalité des risques liés à la protection des données, et il n'a pas tenu compte de l'objectif principal d'une approche basée sur les risques, à savoir mesurer les risques pour prendre des décisions éclairées. Le monde juridique doit comprendre que la gestion des risques ne fonctionne pas par défaut et plusieurs fois nécessite des méthodes scientifiques appliquées d'analyse des risques. Cette thèse propose un changement d'état d'esprit sur la gestion des risques liés à la protection des données, avec une approche holistique qui fusionne les risques opérationnels, financiers et juridiques. Le concept de valeur à risque des données personnelles est présenté comme le résultat de plusieurs stratégies quantitatives basées sur la modélisation des risques, la jurimétrie, et l'analyse de la protection des données à la lumière de l'apprentissage automatique. Les idées présentées ici contribueront également à la mise en conformité avec les prochaines réglementations basées sur le risque qui reposent sur la protection des données, telles que l'intelligence artificielle. La transformation au risque peut sembler difficile, mais elle est obligatoire pour l'évolution de la protection des données<br>Information security is deeply linked to data protection law, because an ineffective security implementation can lead to personal data breaches. The GDPR is based on a risk-based approach for the protection of the rights and freedoms of the data subjects, meaning that risk management is the mechanism for protecting fundamental rights. However, the state of the art of information security risk management and legal risk management are still immature. Unfortunately, the current state of the art does not assess the multi-dimensionality of data protection risks, and it has skipped the main purpose of a risk-based approach, measuring risk for taking informed decisions. The legal world shall understand that risk management does not work by default, and it often requires applied-scientific methods for assessing risks. This thesis proposes a mindset change with the aim of fixing data protection risk management, with a holistic data protection approach that merges operational, financial, and legal risks. The concept of a Personal Data Value at Risk is introduced as the outcome of several quantitative strategies based on risk modeling, jurimetrics, and data protection analytics. The ideas presented here shall also contribute to comply with upcoming risk-based regulations that rely on data protection, such as artificial intelligence. The risk transformation may appear difficult, but it is compulsory for the evolution of data protection
APA, Harvard, Vancouver, ISO, and other styles
3

NÓBREGA, Thiago Pereira da. "Pareamento privado de atributos no contexto da resolução de entidades com preservação de privacidade." Universidade Federal de Campina Grande, 2018. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/1671.

Full text
Abstract:
Submitted by Emanuel Varela Cardoso (emanuel.varela@ufcg.edu.br) on 2018-09-10T19:58:50Z No. of bitstreams: 1 THIAGO PEREIRA DA NÓBREGA – DISSERTAÇÃO (PPGCC) 2018.pdf: 3402601 bytes, checksum: b1a8d86821a4d14435d5adbdd850ec04 (MD5)<br>Made available in DSpace on 2018-09-10T19:58:50Z (GMT). No. of bitstreams: 1 THIAGO PEREIRA DA NÓBREGA – DISSERTAÇÃO (PPGCC) 2018.pdf: 3402601 bytes, checksum: b1a8d86821a4d14435d5adbdd850ec04 (MD5) Previous issue date: 2018-05-11<br>A Resolução de entidades com preservação de privacidade (REPP) consiste em identificar entidades (e.g. Pacientes), armazenadas em bases de dados distintas, que correspondam a um mesmo objeto do mundo real. Como as entidades em questão possuem dados privados (ou seja, dados que não podem ser divulgados) é fundamental que a tarefa de REPP seja executada sem que nenhuma informação das entidades seja revelada entre os participantes (proprietários das bases de dados), de modo que a privacidade dos dados seja preservada. Ao final da tarefa de REPP, cada participante identifica quais entidades de sua base de dados estão presentes nas bases de dados dos demais participantes. Antes de iniciar a tarefa de REPP os participantes devem concordar em relação à entidade (em comum), a ser considerada na tarefa, e aos atributos das entidades a serem utilizados para comparar as entidades. Em geral, isso exige que os participantes tenham que expor os esquemas de suas bases de dados, compartilhando (meta-) informações que podem ser utilizadas para quebrar a privacidade dos dados. Este trabalho propõe uma abordagem semiautomática para identificação de atributos similares (pareamento de atributos) a serem utilizados para comparar entidades durante a REPP. A abordagem é inserida em uma etapa preliminar da REPP (etapa de Apresentação) e seu resultado (atributos similares) pode ser utilizado pelas etapas subsequentes (Blocagem e Comparação). Na abordagem proposta a identificação dos atributos similares é realizada utilizando-se representações dos atributos (Assinaturas de Dados), geradas por cada participante, eliminando a necessidade de divulgar informações sobre seus esquemas, ou seja, melhorando a segurança e privacidade da tarefa de REPP. A avaliação da abordagem aponta que a qualidade do pareamento de atributos é equivalente a uma solução que não considera a privacidade dos dados, e que a abordagem é capaz de preservar a privacidade dos dados.<br>The Privacy Preserve Record Linkage (PPRL) aims to identify entities, that can not have their information disclosed (e.g., Medical Records), which correspond to the same real-world object across different databases. It is crucial to the PPRL tasks that it is executed without revealing any information between the participants (database owners) during the PPRL task, to preserve the privacy of the original data. At the end of a PPRL task, each participant identifies which entities in its database are present in the databases of the other participants. Thus, before starting the PPRL task, the participants must agree on the entity and its attributes, to be compared in the task. In general, this agreement requires that participants have to expose their schemas, sharing (meta-)information that can be used to break the privacy of the data. This work proposes a semiautomatic approach to identify similar attributes (attribute pairing) to identify the entities attributes. The approach is inserted as a preliminary step of the PPRL (Handshake), and its result (similar attributes) can be used by subsequent steps (Blocking and Comparison). In the proposed approach, the participants generate a privacy-preserving representation (Data Signatures) of the attributes values that are sent to a trusted third-party to identify similar attributes from different data sources. Thus, by eliminating the need to share information about their schemas, consequently, improving the security and privacy of the PPRL task. The evaluation of the approach points out that the quality of attribute pairing is equivalent to a solution that does not consider data privacy, and is capable of preserving data privacy.
APA, Harvard, Vancouver, ISO, and other styles
4

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Full text
Abstract:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.<br>B.S.<br>Bachelors<br>Health and Public Affairs<br>Legal Studies
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "ICT Integration and Data Security and Privacy"

1

Sang-in, Chŏn, ред. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Nanam Chʻulpʻan, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Rajiv, and Brendan Mcquade. Surveillance, Security, and Intelligence-Led Policing in Chicago. Edited by Larry Bennett, Roberta Garner, and Euan Hague. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040597.003.0012.

Full text
Abstract:
This chapter summarizes the Chicago Police Department’s adoption of Intelligence-Led Policing (ILP) since the early-2000s as a crime prevention and deterrence strategy. It reviews the use of technology such as police observation devices (cameras), the centralization of the Police Department’s data operations at the Crime Prevention and Information Center, a sophisticated data analytics “fusion center,” and examines changing technologies of surveillance used by the police. The authors discuss the integration of police surveillance with privately-owned and operated camera systems, and explore how systems like facial and license plate recognition software and gunshot prediction technologies are reshaping security and policing in Chicago. The chapter also assesses concerns about privacy and eroded civil rights provoked by the expanding use of ILP techniques and data.
APA, Harvard, Vancouver, ISO, and other styles
3

Protection of children's personal data: current challenges: a collection of materials. Institute for Digitalisation of Education of NAES of Ukraine, 2025. https://doi.org/10.33407/lib.naes.id/eprint/746007.

Full text
Abstract:
The collection of materials of the scientific and methodological seminar "Protection of children's personal data in the digital age" (May 29, 2025, Kyiv) highlights the current theoretical, legal and applied problems of the formation and development of the information society, the protection of information rights, freedoms and security of the child, the privacy of their life and personal data in the context of the requirements of the legislation of the European Union and the European integration of Ukraine. It also considers a number of legal, ethical and technical aspects of protecting children's personal data in the digital environment, the formation of skills for the safe use of digital technologies in the educational process, as well as the implementation of effective practices for ensuring children's information security in the context of the digitalization of education. The publication is intended for specialists, experts and scientists, scientific and pedagogical workers, representatives of state authorities and local governments, the private sector and civil society, as well as higher education applicants. The abstracts of the reports are submitted in the author's edition.
APA, Harvard, Vancouver, ISO, and other styles
4

ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer Berlin / Heidelberg, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jajodia, Sushil, Nora Cuppens-Boulahia, Frederic Cuppens, Anas Abou El Kalam, and Thierry Sans. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jajodia, Sushil, Nora Cuppens-Boulahia, Frederic Cuppens, Anas Abou El Kalam, and Thierry Sans. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jajodia, Sushil, Nora Cuppens-Boulahia, and Frederic Cuppens. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramonyai, Jerry. Data and Information Technology: Jquery Mobile, Financial Services, Privacy Policies, Security Testing, Software Troubleshooting,TR5 Argo, Continuous Integration and Continuous Delivery . Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leadership, Management and Data Science: Jquery Mobile, Financial Services, Privacy Policies, DM9, Security Testing, Software Troubleshooting, Argo, Continuous Integration and Continuous Delivery . Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liebling, Alison, Shadd Maruna, and Lesley McAra, eds. The Oxford Handbook of Criminology. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198719441.001.0001.

Full text
Abstract:
As the most comprehensive and authoritative single volume on the subject, the sixth edition of the acclaimed Oxford Handbook of Criminology is a completely revised collection of 44 essays by leading authors in the field. It is organized into four sections: Constructions of crime and justice; Borders, boundaries, and beliefs; Dynamics of crime and violence; and Responses to crime. Criminology is expanding its borders, and seeking new answers to questions of crime and punishment, citizenship, and democratic living, including issues of state crime and globalisation. Some of the newest areas of study in criminology include migration, asylum, and the integration of global populations following war or famine; privacy and the governance of ‘big data;’ and the privatisation of justice and security. All of these topics, as well as classic questions of the causes and consequences of crime, receive attention here. The new editors have also made room for greater inclusiveness and diversity, with a wider range of newer scholars taking account of new developments in the field such as zemiology and green criminology, as well as previously neglected themes such as domestic violence and sex work. The chapters contain extensive references to aid further research, and the book is accompanied by an online resource centre featuring: selected chapters from previous editions; guidance on answering essay questions; practice essay questions; web links; and figures and tables from the text.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ICT Integration and Data Security and Privacy"

1

Dubovitskaya, Alevtina, Visara Urovi, Matteo Vasirani, Karl Aberer, and Michael I. Schumacher. "A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Xiaoran, and Yu Gao. "Integration of Digital Art Works and Virtual Reality Technology." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89508-2_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yueying. "System of Government Audit Information Integration Platform Based on Block Chain Technology." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89508-2_132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bozdemir, Beyza, Betül Aşkın Özdemir, and Melek Önen. "PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Burkert, Christian, Maximilian Blochberger, and Hannes Federrath. "Compiling Personal Data and Subject Categories from App Data Models." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tzermias, Zacharias, Vassilis Prevelakis, and Sotiris Ioannidis. "Privacy Risks from Public Data Sources." In ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kasimatis, Dimitrios, William J. Buchanan, Mwarwan Abubakar, et al. "Transforming EU Governance: The Digital Integration Through EBSI and GLASS." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Antignac, Thibaud, David Sands, and Gerardo Schneider. "Data Minimisation: A Language-Based Approach." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garg, Sonakshi, and Vicenç Torra. "Can Synthetic Data Preserve Manifold Properties?" In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guita, Vasco, Daniel Andrade, João Nuno Silva, and Miguel Correia. "Anonymous Trusted Data Relocation for TEEs." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ICT Integration and Data Security and Privacy"

1

Aljumah, Ahmad Ibrahim, Mohammed T. Nuseir, and Ghaleb El Refae. "Privacy and Data Protection on Social Network Sites as Driver of Social Integration." In 2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE, 2024. https://doi.org/10.1109/snams64316.2024.10883809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nevrataki, Theodora, Anastasia Iliadou, George Ntolkeras, et al. "A survey on federated learning applications in healthcare, finance, and data privacy/data security." In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0182160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.

Full text
Abstract:
The healthcare sector has undergone significant transformation in recent years, driven by the adoption of advanced medical technologies like IoT, Cloud Computing, and Big Data. This evolution began with the integration of electronic health records and has expanded to encompass a wide range of digital tools, from medical apps to wearables. These technological advancements have played a crucial role in enhancing patient experiences and outcomes. As healthcare technology has become increasingly interconnected, both physically and in the cyber realm, it has evolved into vast Health Care Information Infrastructures (HCIIs). These HCIIs are of paramount importance due to their critical role in people's well-being and safety. Any disruption, whether through direct actions like medical errors, or indirect actions such as altering patient records can have severe consequences for patient health. Currently, HCIIs are vulnerable because they often rely on isolated cybersecurity products. There is a pressing need to establish a comprehensive security strategy that can coordinate various security components to detect system vulnerabilities and sophisticated attacks. To address this complex challenge, it is essential to break down cybersecurity concerns in the healthcare sector based on the criticality of their assets. Prioritizing emerging solutions in this manner will help mitigate the complexity of the problem. Cyberattacks on the healthcare sector have become increasingly sophisticated and involve not only technical vulnerabilities but also social engineering tactics that exploit individuals with limited technical knowledge. European health and cybersecurity experts must collaborate to develop policies and standards that elevate security maturity throughout the EU. Ultimately, cybersecurity solutions in healthcare should not only enhance security but also have a positive business impact, enabling new services, collaborations, and market opportunities. The proposed solution in this study, represents a state-of-the-art approach to enhancing cybersecurity within HCIIs. It improves the detection and analysis of cyber threats and increases awareness of privacy and security risks in the digital healthcare ecosystem. By providing a Dynamic Situational Awareness Framework, the solution empowers stakeholders in the healthcare sector to recognize, model, and respond to cyber risks, including advanced persistent threats and daily cybersecurity incidents. Additionally, it facilitates the secure exchange of incident-related information aiming to strengthen the security and resilience of modern digital healthcare systems and the associated medical supply chain services. The proposed solution extends the frontiers of various research fields, including security engineering, privacy engineering, and artificial intelligence. Drawing inspiration from biological swarm formations, it brings together these disciplines to empower stakeholders in digital healthcare ecosystems. This leads to the creation of a highly interconnected and advanced intelligence system, comprised of simple nodes or groups of nodes, enabling local interactions and management of healthcare environments. By employing bio-inspired techniques and large-group decision-making models, the framework enhances communication and coordination in complex, distributed networks typical of interconnected healthcare infrastructures. It prioritizes scalability and fault-tolerance, allowing coordinated actions without a central coordinator. This approach streamlines investigation activities within healthcare ecosystems, fostering dynamic intelligence and collective decision-making, even when individual nodes lack a complete view of the situation.
APA, Harvard, Vancouver, ISO, and other styles
4

Miyaji, Atsuko, and Yoshitaka Nagao. "Privacy Preserving Data Integration Protocol." In 2020 15th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2020. http://dx.doi.org/10.1109/asiajcis50894.2020.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tafa, Igli, and Kevin Shahollari. "Reducing Cyber Incident Response to Protect CNI from Cyber Attacks using an N-SIEM Integration with an ICTI-CNI." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111818.

Full text
Abstract:
The rapid evolution of technology has increased the role of cybersecurity and put it at the center of nationalcritical infrastructure. This role supports and guarantees the vital services of (CNI) while provides the proper functionalities for running operations between the public and private sectors. This evolution has hadthe same impact on cyberattack tools, methods, techniques used to gain unauthorized access to these computer systems that contain confidential and high-value information in the digital data sales market or asit called "darkweb". As a result, it has become necessary to monitor all events of the National Critical Infrastructure (CNI) computer systems. This proposed system uses a centralized National SIEM (N-SIEM) specializing in the correlation of security events caused by cyber attacks, collected by CNIs systems while integrating with anInternational Cyber Threat Intelligence system (ICTI-CNI). In addition, this conceptual model collects security breach events of CNIs systems, analyzes only cyber attacks, and correlates these security events in real-time with an intelligent automated platform while reducing the response time of security analysts.
APA, Harvard, Vancouver, ISO, and other styles
6

Aks, Safriadi M. Yunus, Mila Karmila, Bryan Givan, et al. "A Review of Blockchain for Security Data Privacy with Metaverse." In 2022 International Conference on ICT for Smart Society (ICISS). IEEE, 2022. http://dx.doi.org/10.1109/iciss55894.2022.9915055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dwivedi, Akhilesh, Neeraj Patel, and Rishab Pastariya. "Deep Learning Innovations for IoT Network Security and Data Privacy." In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2023. http://dx.doi.org/10.1109/ictbig59752.2023.10455976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Anduo, Jason Croft, and Eduard Dragut. "Reflections on Data Integration for SDN." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. ACM, 2017. http://dx.doi.org/10.1145/3040992.3041006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mireku Kwakye, Michael, and Ken Barker. "Privacy-preservation in the integration and querying of multidimensional data models." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Antonoaie, Cristina. "ASPECTS REGARDING ICT TRUST, SECURITY AND PRIVACY IN EU COUNTRIES." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-156.

Full text
Abstract:
In today's world, using modern technology and especially the smartphone can ease a lot our work and other activities. But also the risk is very high. We can talk about several security concerns related to Internet usage. Many individuals are not aware of the threats that this usage is creating. Having installed an IT security software it is not mandatory for the moment, but it is more than necessary in protecting our personal information, documents, pictures and any other data. Security concerns already are limiting or preventing the individuals from ordering or buying goods or services from the Internet, or from carrying out internet banking, or from providing personal information to social or professional networking services, or from communicating with public services or administrations, downloading and submitting official forms, or from downloading software or apps, music, video files, games or other data files. The routine day-to-day activities on the Internet like sending or receiving e-mails, telephoning or video calls, posting messages to social media sites or instant messaging, participating in social networks, finding information about goods and services, reading or downloading online newspaper or news, downloading software, internet banking, travel and accommodation services, job search or sending an application, communication, finding different information that we don't' usually use or downloading /listening to/ watching / playing music, films and/or games it is something that people will always do. With the help of the data provided by EUROSTAT, we analyzed the main risks concerning ICT trust, security and privacy in EU Countries.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ICT Integration and Data Security and Privacy"

1

Dover, Mike. Open Source and Energy Interoperability: Opportunities for Energy Stakeholders in Canada. The Linux Foundation, 2024. https://doi.org/10.70828/vlfn5091.

Full text
Abstract:
The energy sector faces immense pressure to increase its supply while at the same time becoming greener and smarter. Open source software (OSS) can help speed up this transition in a number of ways, in particular by enabling the integration of distributed energy sources. How does OSS solve the issue of interoperability amongst these different energy sources? In a study prepared for Natural Resources Canada, LF Research investigated this research question in the context of the Canadian energy grid. From interviews with 17 experts working in energy grid modernization, this report explains the main reasons for harmonizing the grid, distills the key blockers of interoperability — communication, data sharing, privacy and security — and describes how the adoption of standards can be improved in order to overcome these obstacles. It also provides some case studies where open source adoption has led to more sustainable, effective, and interoperable energy utility projects.
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats, such as adversarial machine learning, model poisoning, and API exploitation, while analyzing AI-powered cybersecurity techniques for threat detection, anomaly prediction, and zero-trust security. The study also examines the role of cryptographic solutions, including homomorphic encryption, federated learning security, and post-quantum cryptography, in safeguarding AI models and data integrity. By integrating AI with cutting-edge cybersecurity strategies, this research aims to enhance resilience, compliance, and trust in AI-driven infrastructures. Future advancements in AI security, blockchain-based authentication, and quantum-enhanced cryptographic solutions will be critical in securing next-generation AI applications in cloud and edge environments. Keywords: AI security, adversarial machine learning, cloud computing security, edge computing security, zero-trust AI, homomorphic encryption, federated learning security, post-quantum cryptography, blockchain for AI security, AI-driven threat detection, model poisoning attacks, anomaly prediction, cyber resilience, decentralized AI security, secure multi-party computation (SMPC).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!