期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
1
作者 Dominik Molitor Aditya Saharia +1 位作者 Viju Raghupathi Wullianallur Raghupathi 《Journal of Information Security》 2024年第2期168-195,共28页
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This... Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents. 展开更多
关键词 Cyber Security Information Security Data breaches Descriptive Analytics PRIVACY Visualization Visual Analytics
下载PDF
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
2
作者 Mohammed Mohammed Raoof 《Journal of Information Security》 2024年第2期232-244,共13页
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati... Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches. 展开更多
关键词 SP 800-66 Revision 1 SP 800-66 Revision 2 HIPAA Compliance Security breaches Risk Management Framework (RMF) Internet of Things (IoT) Artificial Intelligence (AI)
下载PDF
Soil and Crop Damages as a Result of Levee Breaches on Ohio and Mississippi Rivers 被引量:4
3
作者 Kenneth R. Olson Lois Wright Morton 《Journal of Earth Science and Engineering》 2013年第3期139-158,共20页
Whenever levees on the Ohio or Mississippi rivers are breached, there are soil damages in the flooded areas that impact agricultural management capacities and crop productivity. Floodwaters coat the entire flooded lan... Whenever levees on the Ohio or Mississippi rivers are breached, there are soil damages in the flooded areas that impact agricultural management capacities and crop productivity. Floodwaters coat the entire flooded land surface with sediments which include a variety of pollutants, nutrients and contaminants. The nature of the sediments in floodwaters varies with the topographical and land use characteristics of the watershed. The soil types, hydro-geologic features, volume of flow, time of year, agricultural use of fertilizers, pesticides, and other chemicals as well as upstream point sources such as sewage treatment plants, storm sewer drainage and other urban land uses will affect the extent of the contamination and fine scale remediation needed. Preliminary characterization and measurement of soils and sediment deposit at three locations that experienced recent natural and man induced levee breaches are analyzed to identify patterns of soil and crop damage. These findings provide guidance to the restoration of craters, gullies, land scoured areas and contaminated sediment depositional sites with a goal to improve decision-making, risk analysis and remedial effectiveness. Recommendations include: (1) improve characterization and measurement of eroded soils and distribution of sediment contaminants after levee breaching; (2) assess contamination effects on soil productivity and long term agricultural production in order to understand the impacts of flooding on agricultural soils; (3) evaluate reconstruction investments needed to repair levees based on return of the land to productivity and increased landscape resilience by reducing vulnerability to future flooding and levee breaching stress. 展开更多
关键词 FLOODING levee breaches crop loss EROSION GULLIES soil contamination.
下载PDF
Considerations for Restriction on the Right of Rescission in Case of Obviously Minor Breaches
4
作者 Xu Wei Chen Haoran 《Contemporary Social Sciences》 2023年第3期85-98,共14页
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract... Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches. 展开更多
关键词 obviously minor breaches right of rescission considerations
下载PDF
Management of Classes with Breaches of Discipline
5
作者 陈海军 《文理导航》 2009年第Z3期83-83,85,共2页
As an only child is pampered and spoiled by parents, the contemporary student easily breaches class discipline. Class management appears more concerned than ever because breaches of class discipline have great impact ... As an only child is pampered and spoiled by parents, the contemporary student easily breaches class discipline. Class management appears more concerned than ever because breaches of class discipline have great impact on teaching. The author clarifies the necessity to study the management of classes with breaches of class discipline, numerates the phenomena of breaches of class discipline, precisely analyzes the causes from teachers and students and especially submits several measures to effectively prevent breaches of class discipline. 展开更多
关键词 breaches of DISCIPLINE DISPOSAL of stimulate motiv
下载PDF
Medical Information Breaches Occurrence with Respect to Social Media Usage, in Selected Medical Institutions in Uganda
6
作者 Joe Mutebi Margaret Kareyo +3 位作者 Umezuruike Chinecherem Hussein Muhaise Paul Akampurira Maxwell Okello 《Journal of Computer and Communications》 2022年第10期10-33,共24页
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed... The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda. 展开更多
关键词 SM Usage Medical Information breaches Medical Information Safety Electronic Healthcare Information Medical Institutions
下载PDF
Frequent Breaches in Irrigation Canals in Sindh Pakistan
7
作者 Riaz Bhanbhro Nadhir Al-Ansari Sven Knutsson 《Journal of Water Resource and Protection》 2014年第4期214-223,共10页
Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Ru... Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions. 展开更多
关键词 Canal breaches Embankment Failures Long Term Breach Prediction Irrigation System Sindh
下载PDF
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
8
作者 Chevroen Washington Phillip Yarbrough +3 位作者 Shavon Parker Rafia Islam Vishnu Vardhan Patamsetti Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2022年第2期15-30,共16页
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to... This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase. 展开更多
关键词 Information Assurance Ransomware Data Breach HACKER HIPPA PHISHING Department of Health and Human Services
下载PDF
A risk scoring system for seafood supply chain breaches and examination of freshwater fish imported to Australia
9
作者 Michelle Williams Marta Hernandez-Jover +1 位作者 Thomas Williams Shokoofeh Shamsi 《Food Quality and Safety》 SCIE CSCD 2021年第3期256-270,共15页
Legislative changes have altered the way imported edible seafood is inspected in Australia.Greater onus of responsibility has been placed on exporting countries to provide documentary evidence of adherence to internal... Legislative changes have altered the way imported edible seafood is inspected in Australia.Greater onus of responsibility has been placed on exporting countries to provide documentary evidence of adherence to internally recognized food safety standards.According to global trade agreements,any additional safety tests applied to freshwater fish imported into Australia must be justified.Therefore,the aim of this study was to develop a risk scoring method to provide justification for identifying countries as'Freshwater fish high risk'and to examine the seafood they export to Australia for seafood supply chain breaches.Scori ng was con ducted using six predictor variables,identified in the literature as important contributors to seafood supply chain breaches,to achieve the outcome variable,Country considered'Freshwater fish high risk.Sixty-seven fish fillets(9.55 kg)of the same species were examined from the third highest scoring country(Country 20)and 562(5.6 kg)whole fish from the sixth highest scoring country(Country 22).Country 20 had supply chain breaches of 28 macroscopic yellow cysts in one fillet.Two hundred and thirteen parasites and other supply chain breaches were identified in fish from Country 22,in eluding retai ned liver(91 per cent),visible mud(11 per cent),a variety of debris(16 per cent)and,depending on the commodity code,these fish were imported to Australia under full intestine(90 per cent),retained gills(89 per cent),and partial intestine(9 per cent).Three serious physical hazards were recovered from the edible portion of three'consumer-ready' fish and snails of Genus Lymnaea and Indoplanorbis were recovered from gill mud also from'consumer-readyz fish.The study showed variable results from the scoring system and vast differences in seafood supply chain breaches between the third and sixth highest scoring countries. 展开更多
关键词 Imported seafood supply chain breaches parasites.
原文传递
Breaches of the Baige Barrier Lake: Emergency response and dam breach flood 被引量:22
10
作者 CAI YaoJun CHENG HaiYun +4 位作者 WU ShuaiFeng YANG QiGui WANG Lin LUAN YueSheng CHEN ZuYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2020年第7期1164-1176,共13页
This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between S... This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between Sichuan and Tibet in China. The barrier lake created by the "10.10" landslide breached on October 12 and triggered a flood with a peak discharge around 10000 m^3/s. The residual landslide barrier was enhanced by a second landslide on November 3, resulting in a higher barrier with larger flood potential. An overflow channel was excavated in the crest of the barrier to prompt the breach to be triggered at a lower water level. The second breach happened on November 12 with a measured peak discharge of 31000 m^3/s. Nearly 75000 people were evacuated before the two breaches. In order to prevent the downstream dams from possible over-topping, nearly 3.27×10~8 m^3 of the stored volume was released from the Liyuan reservoir 688 km downstream of Baige Barrier Lake. This paper presents the measured hydrographs and the back-analysis results for the "11.03" barrier lake. It is shown that the modern models of dam breach hydraulics can reasonably reproduce the barrier breach hydrographs;however, further studies are needed to define the key parameters which highly influence the calculated results. Knowledge acquired during the emergency response to the case can be shared with experts working on breaches of embankment dams and can be referenced to promote both the theory study and the engineering practice to mitigate the potential risks caused by this type of catastrophic events. 展开更多
关键词 dam breach back analysis baige barrier lake emergency response downstream flood propagation
原文传递
Cyberattack Ramifications, The Hidden Cost of a Security Breach
11
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity breaches Data breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
12
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient Privacy Confidentiality breaches Data Security Data Protection Regulatory Compliance User Consent Data Encryption Third-Party Integration User Awareness
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
13
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
Numerical three-dimensional modeling of earthen dam piping failure
14
作者 Zhengang Wang 《Water Science and Engineering》 EI CAS CSCD 2024年第1期72-82,共11页
A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice fl... A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation. 展开更多
关键词 3D dam breach model 2D shallow water equations 3D slope stability analysis Piping failure Teton Dam Quail Creek Dike
下载PDF
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
15
作者 Binita Saha Zahid Anwar 《Journal of Information Security》 2024年第1期24-39,共16页
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ... Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business. 展开更多
关键词 ENTREPRENEURSHIP CYBERSECURITY Small and Medium Businesses Data Breach HACKING Security
下载PDF
MIKE软件技术在水库溃坝洪水数值模拟中的应用研究
16
作者 管静 《水利科技与经济》 2024年第2期109-114,共6页
当前,水库大坝受到超频率的洪水以及强震破坏,而容易导致溃决风险。针对水库大坝溃决相关问题,融合BREACH和MIKE21构建耦合模型,并用于溃坝洪水数值模拟试验。结果表明,7种方案最大下泄流量为方案1的18.39×10^(4) m^(3)/s;方案1洪... 当前,水库大坝受到超频率的洪水以及强震破坏,而容易导致溃决风险。针对水库大坝溃决相关问题,融合BREACH和MIKE21构建耦合模型,并用于溃坝洪水数值模拟试验。结果表明,7种方案最大下泄流量为方案1的18.39×10^(4) m^(3)/s;方案1洪峰向地点C汇入点的洪水最大流量比邢台坝址下降约44%。方案1的溃坝洪水水位始终最高,A地最高为306m。综合来看,耦合模型在水库溃坝洪水数值模拟中具备有效性,在实际的水库防洪避险中具备实用性。 展开更多
关键词 MIKE21 溃坝洪水 BREACH模型 溃口流量
下载PDF
两种溃坝模型在唐家山堰塞湖溃决模拟中的对比 被引量:19
17
作者 李相南 陈祖煜 《水利水电科技进展》 CSCD 北大核心 2017年第2期20-26,共7页
基于唐家山堰塞坝溃决的实测数据,使用BREACH模型及中国水科院DB-IWHR模型,对唐家山堰塞坝溃决过程进行了反演分析,并对两种模型进行参数敏感性分析。研究结果表明:使用针对唐家山的参数,两种模型均可较好地反演唐家山溃决洪水的过程,BR... 基于唐家山堰塞坝溃决的实测数据,使用BREACH模型及中国水科院DB-IWHR模型,对唐家山堰塞坝溃决过程进行了反演分析,并对两种模型进行参数敏感性分析。研究结果表明:使用针对唐家山的参数,两种模型均可较好地反演唐家山溃决洪水的过程,BREACH模型的下游坡比和孔隙率是对结果影响比较敏感的输入参数;DB-IWHR模型在冲刷参数和下游水深计算两方面做了改善,较好地解决了这一问题;DB-IWHR提供了一个Excel格式的计算软件,数值分析稳定性好,使用简洁客观,可供类似堰塞湖应急处置时参考。 展开更多
关键词 堰塞湖 BREACH模型 DB-IWHR模型 溃坝洪水分析 唐家山
下载PDF
基于NWS BREACH的唐家山堰塞坝泄流过程模拟 被引量:1
18
作者 刘若星 钟启明 霍家平 《人民长江》 北大核心 2016年第3期88-92,共5页
NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模... NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模型中的重要参数进行了敏感性分析,研究了坝料平均粒径、冲蚀率、下游坝坡坡比3个参数对模型计算结果的影响,表明坝料冲蚀率和下游坝坡坡比对泄流过程影响显著。研究成果对堰塞坝除险和洪水风险评估具有指导意义。 展开更多
关键词 NWS BREACH模型 唐家山堰塞坝 泄流模拟 敏感性分析
下载PDF
改良Breach法治疗腋臭8例 被引量:7
19
作者 韩承新 《武警医学》 CAS 2000年第1期22-22,共1页
关键词 腋臭 改良Breach法 外科手术 治疗
下载PDF
Enhancing Blockchain Security Using Ripple Consensus Algorithm
20
作者 A.Baseera Abeer Abdullah Alsadhan 《Computers, Materials & Continua》 SCIE EI 2022年第12期4713-4726,共14页
In the development of technology in various fields like big data analysis,data mining,big data,cloud computing,and blockchain technology,security become more constrained.Blockchain is used in providing security by enc... In the development of technology in various fields like big data analysis,data mining,big data,cloud computing,and blockchain technology,security become more constrained.Blockchain is used in providing security by encrypting the sharing of information.Blockchain is applied in the peerto-peer(P2P)network and it has a decentralized ledger.Providing security against unauthorized breaches in the distributed network is required.To detect unauthorized breaches,there are numerous techniques were developed and those techniques are inefficient and have poor data integrity.Hence,a novel technique needs to be implemented to tackle the new breaches in the distributed network.This paper,proposed a hybrid technique of two fish with a ripple consensus algorithm(TF-RC).To improve the detection time and security,this paper uses efficient transmission of data in the distributed network.The experimental analysis of TF-RC by using the metric measures of performance in terms of latency,throughput,energy efficiency and it produced better performance. 展开更多
关键词 Blockchain SECURITY RIPPLE breaches TWOFISH NETWORK
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部