Results 21 to 30 of about 3,073,944 (343)
Background The UK Health Security Agency (UKHSA) COVID-19 Outbreak Surveillance Team (OST) was established in June 2020 to provide Local Authorities (LAs) in England with surveillance intelligence to aid their response to the SARS-CoV-2 epidemic. Reports
Katriina Willgert +6 more
doaj +1 more source
IoT data encryption algorithm for security [PDF]
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core
Securing a Local Training Dataset Size in Federated Learning
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin +3 more
doaj +1 more source
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W +3 more
openaire +4 more sources
Some Potential Issues with the Security of HTML5 IndexedDB [PDF]
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy +2 more
core +1 more source
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources
On the Need for a General REST-Security Framework
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept.
Luigi Lo Iacono +2 more
doaj +1 more source
Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang +5 more
doaj +1 more source
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti +8 more
core +1 more source
Multi-Features Refinement and Aggregation for Medical Brain Segmentation
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu +4 more
doaj +1 more source

