Results 21 to 30 of about 240,934 (135)
Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley +2 more
core +2 more sources
Challenges of Utilizing Crypto-currencies in Capital Markets: An Islamic Jurisprudence Approach [PDF]
Money as a medium of exchange signifies anything widely accepted as a means of payment. There are two types of money: commodity money, any money deriving its price from its own intrinsic and inherent value, such as gold or silver, and fiat money, the ...
Reza Mirzakhani, Farhad Morsali Pavarsi
doaj +1 more source
Do GANs leave artificial fingerprints?
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego +3 more
core +1 more source
This paper introduces Contextual Object Grouping (COG), a specific computer vision framework that enables automatic interpretation of technical security diagrams through dynamic legend learning for intelligent sensing applications.
Jan Kapusta +2 more
doaj +1 more source
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin +3 more
core
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie +7 more
core +2 more sources
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
Firearm-related action recognition and object detection dataset for video surveillance systems
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria +4 more
doaj +1 more source

