Results 1 to 10 of about 1,012,475 (191)

The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset

open access: yesJOIV: International Journal on Informatics Visualization, 2020
Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations.
Yakubu Ajiji Makeri
doaj   +2 more sources

Distributed Machine Learning Architecture for Security Improvement in Computer Drafting and Writing in Art Asset Identification System

open access: goldInternational Journal on Recent and Innovation Trends in Computing and Communication, 2023
Art asset identification service is becoming increasingly important in the art market, where the value of art assets is constantly changing. The service provides authentication, evaluation, and provenance research for artworks, which helps art collectors and institutions to protect their investments and ensure the authenticity of their collections. The
Xing Yin
openalex   +3 more sources

Computing Optimal Security Strategies for Interdependent Assets [PDF]

open access: yesarXiv, 2012
We introduce a novel framework for computing optimal randomized security policies in networked domains which extends previous approaches in several ways. First, we extend previous linear programming techniques for Stackelberg security games to incorporate benefits and costs of arbitrary security configurations on individual assets.
Letchford, Joshua, Vorobeychik, Yevgeniy
arxiv   +3 more sources

Do GANs leave artificial fingerprints? [PDF]

open access: yesConference on Multimedia Information Processing and Retrieval, 2018
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego   +3 more
core   +2 more sources

A computational model for gender asset gap management with a focus on gender disparity in land acquisition and land tenure security [PDF]

open access: yesarXiv
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
arxiv   +3 more sources

A Model for Assessing Network Asset Vulnerability Using QPSO-LightGBM [PDF]

open access: yesarXiv
With the continuous development of computer technology and network technology, the scale of the network continues to expand, the network space tends to be complex, and the application of computers and networks has been deeply into politics, the military, finance, electricity, and other important fields.
Gu, Yu   +3 more
arxiv   +2 more sources

Understanding Security Issues in the NFT Ecosystem [PDF]

open access: yesConference on Computer and Communications Security, 2021
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth ...
Dipanjan Das   +4 more
semanticscholar   +1 more source

Forgery face detection method based on multi-domain temporal features mining

open access: yes网络与信息安全学报, 2023
Financial technology has greatly facilitated people’s daily life with the continuous development of computer technology in the financial services industry.However, digital finance is accompanied by security problems that can be extremely harmful.Face ...
Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU
doaj   +3 more sources

A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures [PDF]

open access: yesSoftware: Practice and Experience, 2020
SummaryFog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed.
Farhadi, Mozhdeh   +3 more
openaire   +5 more sources

Super-Fast Computation for the Three-Asset Equity-Linked Securities Using the Finite Difference Method [PDF]

open access: yesMathematics, 2020
In this article, we propose a super-fast computational algorithm for three-asset equity-linked securities (ELS) using the finite difference method (FDM). ELS is a very popular investment product in South Korea. There are one-, two-, and three-asset ELS. The three-asset ELS is the most popular financial product among them.
Chaeyoung Lee   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy