Results 71 to 80 of about 111,415 (271)

Detection of Electric Network Frequency in Audio Using Multi-HCNet

open access: yesSensors
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li   +6 more
doaj   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Detecting periodic subsequences in cyber security data

open access: yes, 2017
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick   +2 more
core   +1 more source

ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq   +2 more
wiley   +1 more source

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

Malicious email mitigation strategies [PDF]

open access: yes
Introduction Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.
Australian Cyber Security Centre
core  

Autonomic computing architecture for SCADA cyber security [PDF]

open access: yes, 2017
Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies.
Nazir, S   +5 more
core   +1 more source

Strategies for Realizing Industry 5.0 Inclusive Sustainability Goals for Sustainable Development: A Structured Framework for Overcoming Barriers and Guiding Transformation

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Industry 5.0 has emerged to address the limitations of Industry 4.0 by emphasizing inclusive sustainability through environmentalism, human‐centricity, and resilience. However, its development faces barriers across technological, organizational, and social dimensions.
Mohammad Ali Beheshtinia   +4 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Cyber Security [PDF]

open access: yesThe 5th Conference on Information and Knowledge Technology, 2013
  +7 more sources

Home - About - Disclaimer - Privacy