Results 31 to 40 of about 3,264,256 (293)
Toward Security Verification against Inference Attacks on Data Trees
This paper describes our ongoing work on security verification against inference attacks on data trees. We focus on infinite secrecy against inference attacks, which means that attackers cannot narrow down the candidates for the value of the sensitive ...
Fujiwara, Toru +2 more
core +4 more sources
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma +4 more
doaj +1 more source
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire +4 more sources
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
The rapid expansion of Internet of Things deployments has introduced significant challenges in trust management and certificate lifecycle administration.
Wenlong Han +4 more
doaj +1 more source
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek +13 more
wiley +1 more source
Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu +4 more
doaj +1 more source
Multi-Features Refinement and Aggregation for Medical Brain Segmentation
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu +4 more
doaj +1 more source

