Results 31 to 40 of about 3,264,256 (293)

Toward Security Verification against Inference Attacks on Data Trees

open access: yes, 2013
This paper describes our ongoing work on security verification against inference attacks on data trees. We focus on infinite secrecy against inference attacks, which means that attackers cannot narrow down the candidates for the value of the sensitive ...
Fujiwara, Toru   +2 more
core   +4 more sources

GLF-NET: Global and Local Dynamic Feature Fusion Network for Real-Time Steel Strip Surface Defect Detection

open access: yesIEEE Access
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma   +4 more
doaj   +1 more source

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Data Security

open access: yesData Science Journal, 2013
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire   +4 more sources

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

GNN-based trust propagation and intelligent certificate revocation decision mechanism for large-scale IoT networks

open access: yesScientific Reports
The rapid expansion of Internet of Things deployments has introduced significant challenges in trust management and certificate lifecycle administration.
Wenlong Han   +4 more
doaj   +1 more source

Detecting periodic subsequences in cyber security data

open access: yes, 2017
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick   +2 more
core   +1 more source

Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek   +13 more
wiley   +1 more source

Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture

open access: yesIEEE Access, 2018
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu   +4 more
doaj   +1 more source

Multi-Features Refinement and Aggregation for Medical Brain Segmentation

open access: yesIEEE Access, 2020
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy