Results 11 to 20 of about 1,413,174 (285)
Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang +3 more
doaj +1 more source
Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj +1 more source
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj +1 more source
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S. +8 more
core +2 more sources
Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj +1 more source
Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean +5 more
core +3 more sources
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core +2 more sources
SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU +2 more
doaj

