Results 71 to 80 of about 37,859 (190)

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj   +1 more source

Methodology for Predictive Cyber Security Risk Assessment (PCSRA)

open access: diamond, 2023
Daniel Jorge Ferreira   +2 more
openalex   +1 more source

Named entity recognition model based on Multi‐BiLSTM and competition mechanism

open access: yesElectronics Letters
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou   +3 more
doaj   +1 more source

Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration

open access: yesElectronics Letters
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou   +3 more
doaj   +1 more source

Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication

open access: yesInformation
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng   +3 more
doaj   +1 more source

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

open access: yesIEEE Access
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy