Results 11 to 20 of about 3,500,013 (329)
The Information Security of Enterprises and Citizens' Security Context [PDF]
The aim of the article to show the analogical procedures encountered while dealing with the security of a company or personal security. Security of Information Systems relates closely to modern-day life and the solution of crisis situations is but one ...
Roman Jasek
doaj +2 more sources
Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core +13 more sources
5G wireless P2MP backhaul security protocol: an adaptive approach
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim +4 more
doaj +1 more source
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin +3 more
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li +4 more
doaj +1 more source
Risk management-based security evaluation model for telemedicine systems
Background Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections.
Dong-won Kim +2 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source
The LBC-3 lightweight encryption algorithm
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule +3 more
doaj +1 more source
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu +4 more
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj

