Results 81 to 90 of about 25,084,029 (287)
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo+3 more
core +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Analysis of AES, SKINNY, and Others with Constraint Programming
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun+6 more
doaj +1 more source
An improved face attributes editing method based on DDIM
The main advantage of DDIM is that it guarantees the quality of the generated images while increasing the efficiency of the generation by modifying the sampling strategy in the diffusion process.
Libo He+6 more
doaj +1 more source
Improving Variational Graph Autoencoders With Multi-Order Graph Convolutions
Variational Graph Autoencoders (VAGE) emerged as powerful graph representation learning methods with promising performance on graph analysis tasks. However, existing methods typically rely on Graph Convolutional Networks (GCN) to encode the attributes ...
Lining Yuan+3 more
doaj +1 more source
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities
Benefiting from the advancement of algorithms in massive data and powerful computing resources, deep learning has been explored in a wide variety of fields and produced unparalleled performance results.
Guowen Xu+4 more
semanticscholar +1 more source
Data security in theory and practice Possibile security holes [PDF]
There are no enterprises which would not use computers to fulfill their administrative tasks. Computers became part of everyday administration, or, better to say: they became part of everyday life. This is why our age is called 'information age'.
György Kadocsa, Keszthelyi András
core
The impact of Big Data analytics and data security practices on service supply chain performance
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando+2 more
semanticscholar +1 more source
This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system performance
Ronghe Wang+8 more
doaj +1 more source
Some Special Fields of Data Security [PDF]
Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well.
András Keszthelyi, Anna Francsovics
core