Results 1 to 10 of about 3,122,069 (296)

CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction

open access: yesApplied Sciences, 2023
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao   +3 more
doaj   +1 more source

Future consumer mobile phone security: a case study using the data centric security model [PDF]

open access: yes, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core   +16 more sources

Forecasting influenza hospital admissions within English sub-regions using hierarchical generalised additive models

open access: yesCommunications Medicine, 2023
Background Seasonal influenza places a substantial burden annually on healthcare services. Policies during the COVID-19 pandemic limited the transmission of seasonal influenza, making the timing and magnitude of a potential resurgence difficult to ...
Jonathon Mellor   +7 more
doaj   +1 more source

Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network

open access: yesIEEE Open Journal of the Computer Society, 2021
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun   +3 more
doaj   +1 more source

Deep neural network-aided design of terahertz bifunctional metasurface

open access: yesResults in Physics, 2023
Based on the insulator-to-metal phase transition of vanadium dioxide (VO2), we present a bifunctional metasurface (MS), which can be switched between the two working states, i.e., a broadband absorber and a broadband polarization converter.
Yisong Lv   +5 more
doaj   +1 more source

Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption

open access: yesNature Communications, 2021
Existing approaches to sharing of distributed medical data either provide only limited protection of patients’ privacy or sacrifice the accuracy of results.
David Froelicher   +8 more
doaj   +1 more source

Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]

open access: yesComputer and Knowledge Engineering, 2023
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad   +1 more
doaj   +1 more source

DPENet: Dual-path extraction network based on CNN and transformer for accurate building and road extraction

open access: yesInternational Journal of Applied Earth Observations and Geoinformation, 2023
The acceleration of urbanization and the increasing demand for precise city planning have made the extraction of buildings and roads from remote sensing images crucial.
Ziyi Chen   +5 more
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

Home - About - Disclaimer - Privacy