Results 11 to 20 of about 1,413,174 (285)

Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection

open access: yesInternational Journal of Computational Intelligence Systems, 2023
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang   +3 more
doaj   +1 more source

Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri

open access: yesİşletme Bilimi Dergisi, 2021
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj   +1 more source

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

open access: yesApplied Sciences, 2021
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj   +1 more source

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

Computer Multimedia Security Protection System Based on the Network Security Active Defense Model

open access: yesAdvances in Multimedia, 2021
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj   +1 more source

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Users are not the enemy [PDF]

open access: yes, 1999
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core   +2 more sources

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

Home - About - Disclaimer - Privacy