Results 11 to 20 of about 14,354,866 (342)

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions

open access: yesJournal of the AIS, 2020
The issue of employee noncompliance with information security policies is universal. Noncompliance increases the possibility of invasive information security threats, which can result in compromised organizational assets.
G. Dhillon   +2 more
semanticscholar   +1 more source

The LBC-3 lightweight encryption algorithm

open access: yesOpen Engineering, 2022
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule   +3 more
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

5G wireless P2MP backhaul security protocol: an adaptive approach

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim   +4 more
doaj   +1 more source

The Information Security of Enterprises and Citizens' Security Context

open access: yesCommunications, 2005
The aim of the article to show the analogical procedures encountered while dealing with the security of a company or personal security. Security of Information Systems relates closely to modern-day life and the solution of crisis situations is but one ...
Roman Jasek
doaj   +1 more source

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Risk management-based security evaluation model for telemedicine systems

open access: yesBMC Medical Informatics and Decision Making, 2020
Background Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections.
Dong-won Kim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy