Results 11 to 20 of about 3,238,646 (347)

Relations between information science and information security culture

open access: yesJournal of Modern Science, 2023
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj   +1 more source

A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting

open access: yesApplied Sciences, 2021
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data.
Seungho Jeon   +3 more
doaj   +1 more source

Specialized processors and algorithms for computing standard functions [PDF]

open access: yesE3S Web of Conferences, 2023
This article discusses the problem of creating a specialized processor device that allows you to increase the number of calculated mathematical functions, resulting in a single calculation scheme for all elementary functions, an algorithm for lowering ...
Turdimatov Mamirjon   +4 more
doaj   +1 more source

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]

open access: yesPeerJ Computer Science, 2023
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou   +6 more
doaj   +2 more sources

Multiontology Construction and Application of Threat Model Based on Adversarial Attack and Defense Under ISO/IEC 27032

open access: yesIEEE Access, 2022
Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat models at different abstraction levels are separated from each other ...
Xuan Hu   +4 more
doaj   +1 more source

Defining Information Security [PDF]

open access: yesScience and Engineering Ethics, 2017
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective.
Björn Lundgren, Niklas Möller
openaire   +4 more sources

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +13 more sources

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy