Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- AWARE Program (1)
- Algorithm (1)
- Automotive Supply Chain (1)
- Blockchain Technology (1)
- CVE Database (1)
-
- Common Vulnerabilities and Exposures (1)
- Cybersecurity (1)
- Diagnosis (1)
- Dimond Trade (1)
- Error reduction (1)
- Fake Protection (1)
- Food Trust (1)
- Fraud Protection (1)
- Fraud detection (1)
- Hampton Roads (1)
- Healthcare (1)
- Machine learning (1)
- Network Security (1)
- Online Voting (1)
- Optimization (1)
- Precision medicine (1)
- Quantum computing (1)
- Simulation (1)
- Supply chain (1)
- Vulnerability management (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Quantum Computing And Its Applications In Healthcare, Vu Giang
Quantum Computing And Its Applications In Healthcare, Vu Giang
OUR Journal: ODU Undergraduate Research Journal
This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
OUR Journal: ODU Undergraduate Research Journal
No abstract provided.
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal
The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …