Results 61 to 70 of about 2,666,306 (147)
A Secure Data Enclave and Analytics Platform for Social Scientists [PDF]
Data-driven research is increasingly ubiquitous and data itself is a defining asset for researchers, particularly in the computational social sciences and humanities. Entire careers and research communities are built around valuable, proprietary or sensitive datasets.
arxiv
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Group theory in cryptography [PDF]
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.+2 more
core
Quantum/Relativistic Computation of Security and Efficiency of Electrical Power System for a Day-Ahead [PDF]
An algorithm for Electric Power System (EPS) quantum/relativistic security and efficiency computation for a day-ahead via perturbative renormalization of the EPS, finding the computation flowcharts, verification and validation is built in this paper.
arxiv
Comments on "Routh Stability Criterion" [PDF]
In this note, we have shown special case on Routh stability criterion, which is not discussed, in previous literature. This idea can be useful in computer science applications.
arxiv
Formal Security Analysis of Neural Networks using Symbolic Intervals [PDF]
Due to the increasing deployment of Deep Neural Networks (DNNs) in real-world security-critical domains including autonomous vehicles and collision avoidance systems, formally checking security properties of DNNs, especially under different attacker capabilities, is becoming crucial.
arxiv
STORE: Security Threat Oriented Requirements Engineering Methodology [PDF]
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern.
arxiv
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.+6 more
core
Predicting Tweet Posting Behavior on Citizen Security: A Hawkes Point Process Analysis [PDF]
The Perception of Security (PoS) refers to people's opinions about security or insecurity in a place or situation. While surveys have traditionally been the primary means to capture such perceptions, they need to be improved in their ability to offer real-time monitoring or predictive insights into future security perceptions.
arxiv
A proposal for an incident regime that tracks and counters threats to national security posed by AI systems [PDF]
Recent progress in AI capabilities has heightened concerns that AI systems could pose a threat to national security, for example, by making it easier for malicious actors to perform cyberattacks on critical national infrastructure, or through loss of control of autonomous AI systems.
arxiv