Results 91 to 100 of about 14,261,936 (322)
Fuzzing is a popular and effective software testing technique that automatically generates or modifies inputs to test the stability and vulnerabilities of a software system, which has been widely applied and improved by security researchers and experts ...
Van-Hau Pham+4 more
doaj +1 more source
For large-scale medical images, automatic pulmonary vessel segmentation is a fundamental and essential research for various pulmonary disease diagnoses.
Yajun Xu+3 more
doaj +1 more source
ARCSIM Newsletter, February 2024 [PDF]
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core +1 more source
The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core +1 more source
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established.
Syed Imran Akhtar+3 more
doaj +1 more source
Chaotic iterations versus Spread-spectrum: topological-security and stego-security [PDF]
A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure
arxiv
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role.
A. Erceg
semanticscholar +1 more source
National Security in the Information Age [PDF]
The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously.
Brooks, Rosa
core +1 more source
Improved RANSAC features image-matching method based on SURF
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj +1 more source
Information Flow for Security in Control Systems
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). The area of CPS security, though well studied, suffers from fragmentation.
Datta, Anupam+3 more
core +1 more source