Results 11 to 20 of about 3,073,944 (343)
Future consumer mobile phone security: A case study using the data-centric security model [PDF]
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
André van Cleeff
core +14 more sources
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
Dubhe: a deep-learning-based B5G coverage analysis method
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj
Uncovering the relationships between military community health and affects expressed in social media
Military populations present a small, unique community whose mental and physical health impacts the security of the nation. Recent literature has explored social media’s ability to enhance disease surveillance and characterize distinct communities with ...
Svitlana Volkova +3 more
doaj +1 more source
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long +4 more
doaj +1 more source
Secure Internal Data Markets [PDF]
The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive and negative side effects.
Kieseberg, Peter +2 more
openaire +5 more sources
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu +4 more
doaj +1 more source

