Results 31 to 40 of about 37,859 (190)
A comprehensive review of cyber-physical security risks in new power system
This review systematically examines the multifaceted cyber-physical security risks facing new power systems during the global energy transition, with a focus on three critical dimensions.
Huang Huihui +4 more
doaj +1 more source
In an increasingly digitalized world, small and medium-sized enterprises (SMEs) are exposed to significant cyber threats due to limited security resources.
Ionica ȘERBAN +2 more
doaj +1 more source
Nepenthes Honeypotsbased Botnet Detection
The numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote ...
Sanjeev Kumar +3 more
doaj +1 more source
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
With the rapid development of mobile devices, aggregation security and efficiency topics are more important than past in crowd sensing. When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly ...
Juli Yin +6 more
doaj +1 more source
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan +4 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning
Federated learning is a powerful tool for securing participants’ private data due to its ability to make data “available but not visible”. In recent years, federated learning has been enhanced by the emergence of multi-weight aggregation protocols, which
Yulin Kang +5 more
doaj +1 more source
Symmetric Encryption Algorithms in a Polynomial Residue Number System
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. The main feature of the proposed approach is that when reconstructing the polynomial based on the
I. Yakymenko +3 more
doaj +1 more source
Manet: motion-aware network for video action recognition
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li +4 more
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang +4 more
doaj +1 more source

