Results 31 to 40 of about 373,921 (174)
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
This paper introduces Contextual Object Grouping (COG), a specific computer vision framework that enables automatic interpretation of technical security diagrams through dynamic legend learning for intelligent sensing applications.
Jan Kapusta +2 more
doaj +1 more source
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie +7 more
core +2 more sources
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Firearm-related action recognition and object detection dataset for video surveillance systems
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria +4 more
doaj +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin +3 more
core
Persuasiveness of inclusive language in organizational communication
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj +1 more source
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire +2 more sources
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources

