Results 1 to 10 of about 4,301,094 (348)

Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]

open access: yesFront Psychol, 2017
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc   +2 more sources

A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata [PDF]

open access: yesScientific Reports
The rapid advancement of 5G technology has led to a significant increase in the generation and transmission of visual image data, underscoring the growing need for robust privacy protection.
Shiji Sun   +5 more
doaj   +2 more sources

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

SoK: Explainable Machine Learning for Computer Security Applications [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2022
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem   +6 more
semanticscholar   +1 more source

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]

open access: yes2024 IEEE Security and Privacy Workshops (SPW), 2023
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang   +5 more
semanticscholar   +1 more source

Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]

open access: yesComputer Science Journal of Moldova, 2022
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea   +2 more
doaj   +1 more source

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

COMPUTER NETWORK SECURITY [PDF]

open access: yesCarpathian Journal of Electrical Engineering, 2023
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj  

Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection

open access: yesInternational Journal of Computational Intelligence Systems, 2023
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy