Results 31 to 40 of about 373,921 (174)

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Contextual Object Grouping (COG): A Specialized Framework for Dynamic Symbol Interpretation in Technical Security Diagrams

open access: yesAlgorithms
This paper introduces Contextual Object Grouping (COG), a specific computer vision framework that enables automatic interpretation of technical security diagrams through dynamic legend learning for intelligent sensing applications.
Jan Kapusta   +2 more
doaj   +1 more source

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Firearm-related action recognition and object detection dataset for video surveillance systems

open access: yesData in Brief
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria   +4 more
doaj   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Persuasiveness of inclusive language in organizational communication

open access: yesRes Rhetorica
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj   +1 more source

A Computational Model for Gender Asset Gap Management with a Focus on Gender Disparity in Land Acquisition and Land Tenure Security

open access: yesAmerican Journal of Operations Research
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire   +2 more sources

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]

open access: yes, 2006
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy