Results 51 to 60 of about 288,624 (313)
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn +4 more
wiley +1 more source
A Data Enhancement Algorithm for DDoS Attacks Using IoT
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv +4 more
doaj +1 more source
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg +3 more
wiley +1 more source
MAP-GAN: multi-attribute facial privacy protection model without losing identification
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang +5 more
doaj +1 more source
Label propagation algorithm based on Roll-back detection and credibility assessment
The traditional label propagation algorithm (LPA) iteratively propagates labels from a small number of labeled samples to many unlabeled ones based on the sample similarities.
Ying Dong +5 more
doaj +1 more source
Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley +1 more source
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes +4 more
wiley +1 more source
Fast Payments Across Heterogeneous Blockchains for Internet of Things
Internet of Things data exchange services facilitate the connection and flexible exchange of data among distributed IoT data sources. Traditional IoT data exchange services typically involve direct data uploads to the cloud, allowing service providers to
Zhikai Lin +3 more
doaj +1 more source
Log Analyzer To Detect Malicious Attacks Based On Pattern Matching [PDF]
The Log Analyzer scan through the system logs and search for patterns found in particular cyber threat and come to conclusion whether a system is infiltrated and data is being breached, given if the patterns of cyber threat match with the system logs and
Murthy N. N. A. G. Sadasiva +3 more
doaj +1 more source

