Results 81 to 90 of about 25,084,029 (287)

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +1 more source

Introduction to Security Onion [PDF]

open access: yes, 2016
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core  

Analysis of AES, SKINNY, and Others with Constraint Programming

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun   +6 more
doaj   +1 more source

An improved face attributes editing method based on DDIM

open access: yesScientific Reports
The main advantage of DDIM is that it guarantees the quality of the generated images while increasing the efficiency of the generation by modifying the sampling strategy in the diffusion process.
Libo He   +6 more
doaj   +1 more source

Improving Variational Graph Autoencoders With Multi-Order Graph Convolutions

open access: yesIEEE Access
Variational Graph Autoencoders (VAGE) emerged as powerful graph representation learning methods with promising performance on graph analysis tasks. However, existing methods typically rely on Graph Convolutional Networks (GCN) to encode the attributes ...
Lining Yuan   +3 more
doaj   +1 more source

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities

open access: yesIEEE Communications Magazine, 2019
Benefiting from the advancement of algorithms in massive data and powerful computing resources, deep learning has been explored in a wide variety of fields and produced unparalleled performance results.
Guowen Xu   +4 more
semanticscholar   +1 more source

Data security in theory and practice Possibile security holes [PDF]

open access: yes
There are no enterprises which would not use computers to fulfill their administrative tasks. Computers became part of everyday administration, or, better to say: they became part of everyday life. This is why our age is called 'information age'.
György Kadocsa, Keszthelyi András
core  

The impact of Big Data analytics and data security practices on service supply chain performance

open access: yesBenchmarking : An International Journal, 2018
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando   +2 more
semanticscholar   +1 more source

Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system performance
Ronghe Wang   +8 more
doaj   +1 more source

Some Special Fields of Data Security [PDF]

open access: yes
Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well.
András Keszthelyi, Anna Francsovics
core  

Home - About - Disclaimer - Privacy