Results 51 to 60 of about 1,916,317 (370)
Analysis of Computer Network Information Security and Protection Strategy [PDF]
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer ...
Ming Xiaobo, Chen Ying, Guo Jinhua
doaj +1 more source
An Immune Inspired Approach to Anomaly Detection [PDF]
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core +4 more sources
Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang+3 more
doaj +1 more source
Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean+5 more
core +2 more sources
The enforcement of security policies for computation [PDF]
Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap ...
Anita K. Jones, Richard J. Lipton
openaire +2 more sources
European Cyber Security System [PDF]
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Buffet, Jean-Charles+3 more
core +2 more sources
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core +2 more sources
Blsnet: a tri-branch lightweight network for gesture segmentation against cluttered backgrounds
Hand gesture segmentation is an essential step to recognize hand gestures for human–robot interaction. However, complex backgrounds and the variety of gesture shapes cause low semantic segmentation accuracy in the existing lightweight methods because of ...
Guoyu Zhou, Zhenchao Cui, Jing Qi
doaj +1 more source
An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv +1 more source
Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj +1 more source