Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Catequesis- 97
- Història 69
- Niæos 56
- Bíblia 47
- Historia 43
- Església Catòlica 40
- Engineering & Applied Sciences 37
- Lengua inglesa 34
- Pastoral 34
- Operating systems (Computers) 33
- Crítica bíblica 30
- Obres anteriors al 1800 29
- Catecismos 27
- Aæo litœrgico- 26
- Computer Science 25
- Revistes 25
- Dret canònic 24
- Catequesis 22
- Comentaris 22
- Teologia dogmàtica 21
- Application software 19
- Computer security 19
- Development 19
- Gatos 19
- Documentales 18
- Novela norteamericana 18
- Security measures 17
- Teologia 17
- Crítica i interpretació 16
- Linux 16
-
1201por Al-Turjman, FadiTabla de Contenidos: “…. -- 7.1 Introduction and literature review -- 7.2 Materials and methods -- 7.2.1 Logistic regression -- 7.2.2 Gaussian naive Bayes -- 7.2.3 K-Nearest neighbors -- 7.2.4 Support vector classification -- 7.2.5 Radial basis function -- 7.2.6 Artificial neural network -- 7.2.7 Cart algorithm -- 7.2.8 Random forest -- 7.2.9 Gradient boosting machines -- 7.2.10 XGBoost -- 7.2.11 LightGBM -- 7.2.12 CatBoost -- 7.3 Experimental results -- 7.4 Conclusion and future work -- References -- 8 Healthcare cybersecurity challenges: a look at current and future trends -- 8.1 Introduction -- 8.2 The amount of prior works -- 8.3 Difficulties -- 8.3.1 Security assurance for remote work -- 8.3.2 Endpoint device administration -- 8.3.3 The role of humans in cybersecurity -- 8.3.4 A disregard for security -- 8.3.5 Ineffective risk assessment communication at the board level -- 8.3.6 Poor business continuity strategies -- 8.3.7 Ineffective incident response coordination -- 8.3.8 A tight budget and the requirement to provide healthcare services uninterrupted -- 8.3.9 Dangerous medical cyber-physical systems -- 8.4 A review of current and future trends in cybersecurity challenges in healthcare -- 8.5 Discussion -- 8.5.1 Cyber-physical medical systems -- 8.5.2 Data privacy, confidentiality, and consent -- 8.5.3 Cloud computing -- 8.5.4 Malware -- 8.5.5 Security of health application (or "app") -- 8.5.6 Insider danger -- 8.6 Cybersecurity tools, defenses, and mitigation techniques -- 8.6.1 Cryptographic systems or other technological advances -- 8.6.2 Governance and risk assessment -- 8.6.3 Laws or other regulations -- 8.6.4 A comprehensive strategy for proactive cybersecurity culture -- 8.6.5 Instruction and simulated settings…”
Publicado 2024
Libro electrónico -
1202
-
1203
-
1204
-
1205
-
1206
-
1207
-
1208
-
1209
-
1210
-
1211
-
1212
-
1213
-
1214
-
1215
-
1216
-
1217
-
1218
-
1219
-
1220