Results 21 to 30 of about 1,212,365 (214)

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

Régimen Jurídico de la acción de acceso a la información pública en el Uruguay

open access: yesRevista do Direito, 2016
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj   +1 more source

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali   +2 more
doaj   +1 more source

Statistical Data Privacy: A Song of Privacy and Utility

open access: yesAnnual Review of Statistics and Its Application, 2023
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms that sanitize outputs based on confidential data. Two dominant frameworks exist: statistical disclosure control (SDC) and the more recent differential ...
Slavkovic, Aleksandra, Seeman, Jeremy
openaire   +2 more sources

Privacy in Data Mining

open access: yesData Mining and Knowledge Discovery, 2005
Peer ...
Domingo-Ferrer, Joan, Torra, Vicenç
openaire   +3 more sources

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Practical Data-in-Use Protection Using Binary Decision Diagrams

open access: yesIEEE Access, 2020
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka   +4 more
doaj   +1 more source

Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing

open access: yesIEEE Access, 2022
Advancements in Industry 4.0 brought tremendous improvements in the healthcare sector, such as better quality of treatment, enhanced communication, remote monitoring, and reduced cost.
J. Andrew Onesimu   +4 more
doaj   +1 more source

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy