Results 1 to 10 of about 110,621 (309)

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Computer Security

open access: yesIssues in Science and Technology Librarianship, 2002
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about ...
Jane F. Kinkus
doaj   +3 more sources

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Etalle, Sandro, Zannone, Nicola
openaire   +1 more source

Neural network based single index evaluation for SQL injection attack detection in health care data

open access: yesMeasurement: Sensors, 2023
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam   +4 more
doaj   +1 more source

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

COMPUTER NETWORK SECURITY [PDF]

open access: yesCarpathian Journal of Electrical Engineering, 2023
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj  

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

Analysis of Computer Network Information Security and Protection Strategy [PDF]

open access: yesMATEC Web of Conferences, 2019
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer ...
Ming Xiaobo, Chen Ying, Guo Jinhua
doaj   +1 more source

Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection

open access: yesInternational Journal of Computational Intelligence Systems, 2023
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy