Results 21 to 30 of about 3,073,944 (343)

Influence of SARS-CoV-2 surveillance outputs produced by the UK health security agency (UKHSA) outbreak surveillance team on decision-making by local stakeholders

open access: yesBMC Public Health, 2023
Background The UK Health Security Agency (UKHSA) COVID-19 Outbreak Surveillance Team (OST) was established in June 2020 to provide Local Authorities (LAs) in England with surveillance intelligence to aid their response to the SARS-CoV-2 epidemic. Reports
Katriina Willgert   +6 more
doaj   +1 more source

IoT data encryption algorithm for security [PDF]

open access: yes, 2020
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core  

Securing a Local Training Dataset Size in Federated Learning

open access: yesIEEE Access, 2022
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin   +3 more
doaj   +1 more source

Secure data deduplication

open access: yesProceedings of the 4th ACM international workshop on Storage security and survivability, 2008
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W   +3 more
openaire   +4 more sources

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

On the Need for a General REST-Security Framework

open access: yesFuture Internet, 2019
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept.
Luigi Lo Iacono   +2 more
doaj   +1 more source

Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network

open access: yesIEEE Access, 2018
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang   +5 more
doaj   +1 more source

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Multi-Features Refinement and Aggregation for Medical Brain Segmentation

open access: yesIEEE Access, 2020
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy