Results 61 to 70 of about 5,949,154 (313)

Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree

open access: yesIEEE Access, 2021
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu   +3 more
doaj   +1 more source

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

MAP-GAN: multi-attribute facial privacy protection model without losing identification

open access: yesCybersecurity
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang   +5 more
doaj   +1 more source

Chinese Character Components Segmentation Method Based on Faster RCNN

open access: yesIEEE Access, 2022
To solve the component segmentation problem caused by the sticking and overlapping of parts in incoherent handwritten calligraphy characters, we propose a Chinese character part segmentation method based on Faster RCNN. The method utilizes the advantages
Xiang Gao   +3 more
doaj   +1 more source

An examination into the role of knowledge management and computer security in organizations [PDF]

open access: yes, 2005
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core  

Software for Wearable Devices: Challenges and Opportunities

open access: yes, 2015
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin   +5 more
core   +1 more source

Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]

open access: yes, 2014
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security   +2 more
core   +1 more source

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields

open access: yesIEEE Access, 2021
Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin.
Mar Gimenez-Aguilar   +3 more
doaj   +1 more source

Nice to know [PDF]

open access: yes, 2008
The byproduct of today’s massive interconnectivity is that basically nothing and no-one is immune to cyber attacks any longer. Sadly, this can be demonstrated rather trivially.
Etalle, Sandro
core   +2 more sources

Home - About - Disclaimer - Privacy