Results 1 to 10 of about 5,647,882 (232)

Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]

open access: yesFront Psychol, 2017
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc   +2 more sources

Using deep learning to solve computer security challenges: a survey [PDF]

open access: yesCybersecurity, 2020
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
doaj   +2 more sources

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

SoK: Explainable Machine Learning for Computer Security Applications [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2022
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem   +6 more
semanticscholar   +1 more source

UNSW‐NB15 computer security dataset: Analysis through visualization [PDF]

open access: yesSecurity and Privacy, 2021
Class imbalance refers to a major issue in data mining where data with unequal class distribution can deteriorate classification performance. Although it alone affects the performance of the classifiers, the joint‐effect of class imbalance and overlap is
Zeinab Zoghi, G. Serpen
semanticscholar   +1 more source

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]

open access: yes2024 IEEE Security and Privacy Workshops (SPW), 2023
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang   +5 more
semanticscholar   +1 more source

Neural network based single index evaluation for SQL injection attack detection in health care data

open access: yesMeasurement: Sensors, 2023
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam   +4 more
doaj   +1 more source

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

COMPUTER NETWORK SECURITY [PDF]

open access: yesCarpathian Journal of Electrical Engineering, 2023
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj  

Home - About - Disclaimer - Privacy