Results 1 to 10 of about 63,648 (277)
Recently, cloud computing (CC) received significant interest among organizations and individuals. Despite the significant benefits of CC, security and privacy are considered as the major issue.
D. Prabhu, S. Vijay Bhanu, S. Suthir
doaj +1 more source
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N. +6 more
core +1 more source
In analysis of minutiae based fingerprint systems, fingerprints needs to be pre-processed. The pre-processing is carried out to enhance the quality of the fingerprint and to obtain more accurate minutiae points.
GORGUNOGLU, S. +3 more
doaj +1 more source
Data Leak Detection As a Service: Challenges and Solutions [PDF]
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data.
Shu, Xiaokui, Yao, Danfeng (Daphne)
core +1 more source
UBSegNet: Unified Biometric Region of Interest Segmentation Network
Digital human identity management, can now be seen as a social necessity, as it is essentially required in almost every public sector such as, financial inclusions, security, banking, social networking e.t.c.
Jha, Ranjeet Ranjan +3 more
core +1 more source
Scikit-fingerprints: Easy and efficient computation of molecular fingerprints in Python
In this work, we present scikit-fingerprints, a Python package for computation of molecular fingerprints for applications in chemoinformatics. Our library offers an industry-standard scikit-learn interface, allowing intuitive usage and easy integration with machine learning pipelines.
Jakub Adamczyk, Piotr Ludynia
openaire +3 more sources
Sistem Pintu Cerdas dengan QR Code berbasis Internet of Things sebagai Penerapan Edge Computing
ABSTRAK Sistem pintu cerdas telah merevolusi kontrol akses dengan metode seperti pengenalan sidik jari, kata sandi, dan QR Code. Namun, tantangan seperti ketergantungan pada internet, keterlambatan pengiriman data, dan pembatasan penjadwalan tetap ada ...
MADAJABBAR PALAPA HAKIM +2 more
doaj +1 more source
Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows.
Goeckel, Dennis +3 more
core +1 more source
Fingerprinting Communication and Computation on HPC Machines [PDF]
How do we identify what is actually running on high-performance computing systems? Names of binaries, dynamic libraries loaded, or other elements in a submission to a batch queue can give clues, but binary names can be changed, and libraries provide limited insight and resolution on the code being run.
openaire +4 more sources
In this paper, we propose a source camera identification method based on disentangled feature modeling, aiming to achieve robust extraction of camera fingerprint features under complex imaging and post-processing conditions.
Zijuan Han +5 more
doaj +1 more source

