Results 21 to 30 of about 240,934 (135)

Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]

open access: yes, 2017
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley   +2 more
core   +2 more sources

Challenges of Utilizing Crypto-currencies in Capital Markets: An Islamic Jurisprudence Approach [PDF]

open access: yesIranian Journal of Finance
Money as a medium of exchange signifies anything widely accepted as a means of payment. There are two types of money: commodity money, any money deriving its price from its own intrinsic and inherent value, such as gold or silver, and fiat money, the ...
Reza Mirzakhani, Farhad Morsali Pavarsi
doaj   +1 more source

Do GANs leave artificial fingerprints?

open access: yes, 2018
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego   +3 more
core   +1 more source

Contextual Object Grouping (COG): A Specialized Framework for Dynamic Symbol Interpretation in Technical Security Diagrams

open access: yesAlgorithms
This paper introduces Contextual Object Grouping (COG), a specific computer vision framework that enables automatic interpretation of technical security diagrams through dynamic legend learning for intelligent sensing applications.
Jan Kapusta   +2 more
doaj   +1 more source

Risks and remedies in e-learning system

open access: yes, 2012
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core   +1 more source

THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS

open access: yesВестник Мининского университета, 2018
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Firearm-related action recognition and object detection dataset for video surveillance systems

open access: yesData in Brief
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy