Results 71 to 80 of about 111,415 (271)
Detection of Electric Network Frequency in Audio Using Multi-HCNet
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li +6 more
doaj +1 more source
The Australian Cyber Security Centre threat report 2015 [PDF]
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq +2 more
wiley +1 more source
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
Malicious email mitigation strategies [PDF]
Introduction Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.
Australian Cyber Security Centre
core
Autonomic computing architecture for SCADA cyber security [PDF]
Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies.
Nazir, S +5 more
core +1 more source
ABSTRACT Industry 5.0 has emerged to address the limitations of Industry 4.0 by emphasizing inclusive sustainability through environmentalism, human‐centricity, and resilience. However, its development faces barriers across technological, organizational, and social dimensions.
Mohammad Ali Beheshtinia +4 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source

