Results 11 to 20 of about 3,073,944 (343)

Future consumer mobile phone security: A case study using the data-centric security model [PDF]

open access: green, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
André van Cleeff
core   +14 more sources

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Uncovering the relationships between military community health and affects expressed in social media

open access: yesEPJ Data Science, 2017
Military populations present a small, unique community whose mental and physical health impacts the security of the nation. Recent literature has explored social media’s ability to enhance disease surveillance and characterize distinct communities with ...
Svitlana Volkova   +3 more
doaj   +1 more source

Estimating the Growing Stem Volume of the Planted Forest Using the General Linear Model and Time Series Quad-Polarimetric SAR Images

open access: yesSensors, 2020
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long   +4 more
doaj   +1 more source

Secure Internal Data Markets [PDF]

open access: yesFuture Internet, 2021
The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive and negative side effects.
Kieseberg, Peter   +2 more
openaire   +5 more sources

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising

open access: yesIEEE Access, 2020
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy