Art asset identification service is becoming increasingly important in the art market, where the value of art assets is constantly changing. The service provides authentication, evaluation, and provenance research for artworks, which helps art collectors and institutions to protect their investments and ensure the authenticity of their collections. The
Xing Yin
openaire +3 more sources
Computing Optimal Security Strategies for Interdependent Assets [PDF]
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Letchford, Joshua, Vorobeychik, Yevgeniy
openaire +3 more sources
A computational model for gender asset gap management with a focus on gender disparity in land acquisition and land tenure security [PDF]
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire +3 more sources
Forgery face detection method based on multi-domain temporal features mining
Financial technology has greatly facilitated people’s daily life with the continuous development of computer technology in the financial services industry.However, digital finance is accompanied by security problems that can be extremely harmful.Face ...
Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU
doaj +3 more sources
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures [PDF]
SummaryFog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed.
Farhadi, Mozhdeh+3 more
openaire +5 more sources
Super-Fast Computation for the Three-Asset Equity-Linked Securities Using the Finite Difference Method [PDF]
In this article, we propose a super-fast computational algorithm for three-asset equity-linked securities (ELS) using the finite difference method (FDM). ELS is a very popular investment product in South Korea. There are one-, two-, and three-asset ELS. The three-asset ELS is the most popular financial product among them.
Chaeyoung Lee+6 more
openaire +2 more sources
A framework for evaluating security risk in system design
Design and development of ubiquitous computer network systems has become increasingly difficult as technology continues to grow. From the introduction of new technologies to the discovery of existing threats, weaknesses, and vulnerabilities there is a ...
Paul A. Wortman, John A. Chandy
doaj +1 more source
The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset
Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations.
Yakubu Ajiji Makeri
doaj +1 more source
Impact Assessment for Cyber Security Situation Awareness [PDF]
Cyber security situation awareness is important for the analysis of cyberspace, and detection of ever-changing threats. As computer networks and systems continue to increase in complexity and sophistication, the requirements and on a cybersecurity ...
Sina FarahaniNia+3 more
doaj
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]
In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited ...
Bolzoni, D., Eck, P.A.T. van, Su, X.
core +15 more sources