Reduction of Ict Security Risks Using Level Based Approach
نویسندگان
چکیده
منابع مشابه
Diagnosis of Diabetes Using an Intelligent Approach Based on Bi-Level Dimensionality Reduction and Classification Algorithms
Objective: Diabetes is one of the most common metabolic diseases. Earlier diagnosis of diabetes and treatment of hyperglycemia and related metabolic abnormalities is of vital importance. Diagnosis of diabetes via proper interpretation of the diabetes data is an important classification problem. Classification systems help the clinicians to predict the risk factors that cause the diabetes or pre...
متن کاملdiagnosis of diabetes using an intelligent approach based on bi-level dimensionality reduction and classification algorithms
objective: diabetes is one of the most common metabolic diseases. earlier diagnosis of diabetes and treatment of hyperglycemia and related metabolic abnormalities is of vital importance. diagnosis of diabetes via proper interpretation of the diabetes data is an important classification problem. classification systems help the clinicians to predict the risk factors that cause the diabetes or pre...
متن کاملthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولGenre-Based Approach to Assessing Information and Knowledge Security Risks
Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organizationand knowledge-centric identif...
متن کاملLevel by Level Image Based Data Security Approach
Now-a-days, digital communication is part of every computing system. As the usage is increasing in every aspect of data transfer and sharing; so is the threat of information stealing and security. Data Security over the public network is the major concern of every communication expert. Cryptography and Steganography are the major techniques employed for hiding and securing the data from the cha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JITA - Journal of Information Technology and Applications (Banja Luka) - APEIRON
سال: 2020
ISSN: 2233-0194,2232-9625
DOI: 10.7251/jit1902099dz