Results 1 to 10 of about 3,404,399 (295)
Relations between information science and information security culture
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj +1 more source
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data.
Seungho Jeon +3 more
doaj +1 more source
Specialized processors and algorithms for computing standard functions [PDF]
This article discusses the problem of creating a specialized processor device that allows you to increase the number of calculated mathematical functions, resulting in a single calculation scheme for all elementary functions, an algorithm for lowering ...
Turdimatov Mamirjon +4 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou +6 more
doaj +2 more sources
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +13 more sources
Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat models at different abstraction levels are separated from each other ...
Xuan Hu +4 more
doaj +1 more source
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang +6 more
doaj +1 more source
The Information Security of Enterprises and Citizens' Security Context
The aim of the article to show the analogical procedures encountered while dealing with the security of a company or personal security. Security of Information Systems relates closely to modern-day life and the solution of crisis situations is but one ...
Roman Jasek
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li +4 more
doaj +1 more source

