Results 11 to 20 of about 3,264,256 (293)

Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]

open access: yesComputer and Knowledge Engineering, 2023
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad   +1 more
doaj   +1 more source

Future consumer mobile phone security: a case study using the data centric security model [PDF]

open access: yes, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core   +12 more sources

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Uncovering the relationships between military community health and affects expressed in social media

open access: yesEPJ Data Science, 2017
Military populations present a small, unique community whose mental and physical health impacts the security of the nation. Recent literature has explored social media’s ability to enhance disease surveillance and characterize distinct communities with ...
Svitlana Volkova   +3 more
doaj   +1 more source

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

Estimating the Growing Stem Volume of the Planted Forest Using the General Linear Model and Time Series Quad-Polarimetric SAR Images

open access: yesSensors, 2020
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long   +4 more
doaj   +1 more source

IoT data encryption algorithm for security [PDF]

open access: yes, 2020
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core  

Secure data deduplication

open access: yesProceedings of the 4th ACM international workshop on Storage security and survivability, 2008
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W   +3 more
openaire   +3 more sources

A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising

open access: yesIEEE Access, 2020
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu   +4 more
doaj   +1 more source

Securing a Local Training Dataset Size in Federated Learning

open access: yesIEEE Access, 2022
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy