Results 141 to 150 of about 1,882,955 (187)
Some of the next articles are maybe not open access.
Amidst the evolving technological landscape and readily available tools and high speed internet, there exists a remarkable propensity for technology to be employed with wisdom, misused with malevolence, or catastrophically unleashed. The stark illustration of such catastrophic misuse is the realm of 'Cyber Terrorism.
Aishwarya Majumdar +2 more
openaire +2 more sources
Aishwarya Majumdar +2 more
openaire +2 more sources
Attribute-based Encryption for Cloud Computing Access Control
ACM Computing Surveys, 2021Yinghui Zhang +2 more
exaly
2015
Attribution, finding the identity of actors behind an attack, is of primary importance to be able to classify an attack as a criminal act, an act of war, or an act of terrorism. But attribution is difficult. Many experts and analysts have explained this difficulty with technical arguments.
openaire +1 more source
Attribution, finding the identity of actors behind an attack, is of primary importance to be able to classify an attack as a criminal act, an act of war, or an act of terrorism. But attribution is difficult. Many experts and analysts have explained this difficulty with technical arguments.
openaire +1 more source
Semi-supervised attribute reduction based on label distribution and label irrelevance
Information Fusion, 2023Jianhua Dai, Zhang Chucai
exaly
2007
Abstract One obvious objection to a rights-based conception of the law of torts is the law of vicarious liability. According to the orthodox picture of the law, one party (an employer) who has committed no wrong is liable for the loss caused by the wrong of someone else (an employee).
openaire +1 more source
Abstract One obvious objection to a rights-based conception of the law of torts is the law of vicarious liability. According to the orthodox picture of the law, one party (an employer) who has committed no wrong is liable for the loss caused by the wrong of someone else (an employee).
openaire +1 more source

