Results 301 to 310 of about 22,784,147 (354)
Some of the next articles are maybe not open access.
Private Forensic Toxicology: The Adversary System
Clinical Toxicology, 1977(1977). Private Forensic Toxicology: The Adversary System. Clinical Toxicology: Vol. 10, No. 2, pp. 185-208.
openaire +2 more sources
Detecting Adversarial Examples for Network Intrusion Detection System with GAN
2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), 2020With the increasing scale of network, attacks against network emerge one after another, and security problems become increasingly prominent. Network intrusion detection system is a widely used and effective security means at present.
Ye Peng +5 more
semanticscholar +1 more source
Advocacy and the Adversary System
The Journal of Sociology & Social Welfare, 1987If advocacy is to be a significant aspect of social work it is necessary to distinguish it from other forms of action in which social workers engage, and it must be practiced methodically. This paper offers an approach to advocacy as a technique applied to conflicts resolved within the adversary system.
Kutchins, Herb, Kutchins, Stuart
openaire +2 more sources
International Conference on Information and Knowledge Management, 2019
The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting mobile users against novel threats.
Shifu Hou +8 more
semanticscholar +1 more source
The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting mobile users against novel threats.
Shifu Hou +8 more
semanticscholar +1 more source
Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoder
IEEE/IFIP Network Operations and Management Symposium, 2019As computer networks become vulnerable to attacks from intruders, Intrusion Detection Systems (IDS) is a critical component that monitors activities of computer networks and classifies them as either normal or anomalous. Remarkable advancement of machine
Kazuki Hara, K. Shiomoto
semanticscholar +1 more source
Pareto-Optimal Adversarial Defense of Enterprise Systems
ACM Transactions on Information and System Security, 2015The National Vulnerability Database (NVD) maintained by the US National Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well as any patches available to address these vulnerabilities. Most enterprise security managers today simply patch the most dangerous vulnerabilities—an adversary can
SERRA E +4 more
openaire +2 more sources
Vehicle-to-Everything (V2X) communication enables vehicles to communicate with other vehicles and roadside infrastructure, enhancing traffic management and improving road safety. However, the open and decentralized nature of V2X networks exposes them to various security threats, especially misbehaviors, necessitating a robust Misbehavior Detection ...
Md Hasan Shahriar +7 more
openaire +1 more source
The Adversary System: Role of the Criminalist
Journal of Forensic Sciences, 1973Abstract The basic role of the criminalist is that of assisting in the investigation of an incident by establishing the probability of fact from the physical evidence. At the time of trial he provides to the court, his product, the Truth, by offering opinion testimony and, perhaps, demonstrations to explain exactly what the probative ...
openaire +2 more sources
The Adversary System: Role of the Psychiatrist
Journal of Forensic Sciences, 1973Abstract Forensic psychiatry as a specialty is nonexistent. There is no such sub-specialty recognized within the American Board of Psychiatry and Neurology. Equally as startling within the adversary system is the selection of the so-called forensic psychiatrist.
openaire +2 more sources

