Results 91 to 100 of about 14,261,936 (322)

A Coverage-Guided Fuzzing Method for Automatic Software Vulnerability Detection Using Reinforcement Learning-Enabled Multi-Level Input Mutation

open access: yesIEEE Access
Fuzzing is a popular and effective software testing technique that automatically generates or modifies inputs to test the stability and vulnerabilities of a software system, which has been widely applied and improved by security researchers and experts ...
Van-Hau Pham   +4 more
doaj   +1 more source

Pulmonary Vessel Segmentation via Stage-Wise Convolutional Networks With Orientation-Based Region Growing Optimization

open access: yesIEEE Access, 2018
For large-scale medical images, automatic pulmonary vessel segmentation is a fundamental and essential research for various pulmonary disease diagnoses.
Yajun Xu   +3 more
doaj   +1 more source

ARCSIM Newsletter, February 2024 [PDF]

open access: yes
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core   +1 more source

The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]

open access: yes, 2011
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core   +1 more source

Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls

open access: yesIET Information Security
Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established.
Syed Imran Akhtar   +3 more
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: topological-security and stego-security [PDF]

open access: yesarXiv, 2011
A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure
arxiv  

Information security

open access: yesTehnički glasnik, 2019
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role.
A. Erceg
semanticscholar   +1 more source

National Security in the Information Age [PDF]

open access: yes, 2012
The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously.
Brooks, Rosa
core   +1 more source

Improved RANSAC features image-matching method based on SURF

open access: yesThe Journal of Engineering, 2019
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj   +1 more source

Information Flow for Security in Control Systems

open access: yes, 2016
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). The area of CPS security, though well studied, suffers from fragmentation.
Datta, Anupam   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy