Results 51 to 60 of about 6,166,224 (352)

Computer security for data collection technologies☆

open access: yesInternational Conference on Information and Communication Technologies and Development, 2016
Many organizations in the developing world (e.g., NGOs), include digital data collection in their workflow. Data collected can include information that may be considered sensitive, such as medical or socioeconomic data, and which could be affected by ...
Camille Cobb   +5 more
semanticscholar   +1 more source

Computer Multimedia Security Protection System Based on the Network Security Active Defense Model

open access: yesAdvances in Multimedia, 2021
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj   +1 more source

HRCTNet: a hybrid network with high-resolution representation for object detection in UAV image

open access: yesComplex & Intelligent Systems, 2023
Object detection in unmanned aerial vehicle (UAV) images has attracted the increasing attention of researchers in recent years. However, it is challenging for small object detection using conventional detection methods because less location and semantic ...
Wenjie Xing, Zhenchao Cui, Jing Qi
doaj   +1 more source

An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, 2011
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv   +1 more source

Security of computer communication [PDF]

open access: yesIEEE Communications Society Magazine, 1978
n ...
openaire   +3 more sources

Blsnet: a tri-branch lightweight network for gesture segmentation against cluttered backgrounds

open access: yesComplex & Intelligent Systems, 2023
Hand gesture segmentation is an essential step to recognize hand gestures for human–robot interaction. However, complex backgrounds and the variety of gesture shapes cause low semantic segmentation accuracy in the existing lightweight methods because of ...
Guoyu Zhou, Zhenchao Cui, Jing Qi
doaj   +1 more source

Chinese Character Components Segmentation Method Based on Faster RCNN

open access: yesIEEE Access, 2022
To solve the component segmentation problem caused by the sticking and overlapping of parts in incoherent handwritten calligraphy characters, we propose a Chinese character part segmentation method based on Faster RCNN. The method utilizes the advantages
Xiang Gao   +3 more
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms

open access: yesFEBS Letters, EarlyView.
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze   +3 more
wiley   +1 more source

Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields

open access: yesIEEE Access, 2021
Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin.
Mar Gimenez-Aguilar   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy