Results 11 to 20 of about 14,261,936 (322)

Multiontology Construction and Application of Threat Model Based on Adversarial Attack and Defense Under ISO/IEC 27032

open access: yesIEEE Access, 2022
Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat models at different abstraction levels are separated from each other ...
Xuan Hu   +4 more
doaj   +1 more source

Defining Information Security [PDF]

open access: yesScience and Engineering Ethics, 2017
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective.
Björn Lundgren, Niklas Möller
openaire   +4 more sources

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions

open access: yesJournal of the AIS, 2020
The issue of employee noncompliance with information security policies is universal. Noncompliance increases the possibility of invasive information security threats, which can result in compromised organizational assets.
G. Dhillon   +2 more
semanticscholar   +1 more source

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

The LBC-3 lightweight encryption algorithm

open access: yesOpen Engineering, 2022
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule   +3 more
doaj   +1 more source

End of Year Phishing Advisory and Welcome Message [PDF]

open access: yes, 2023
Announcing the UMS Information Security Advisory Google Group.
UMS Information Security Office   +1 more
core   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy