Results 21 to 30 of about 3,404,399 (295)

Mathematical approximator based on basic spline approximation [PDF]

open access: yesE3S Web of Conferences
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon   +5 more
doaj   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method

open access: yesIET Information Security
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang   +3 more
doaj   +1 more source

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

Information Security as Strategic (In)effectivity

open access: yes, 2016
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder   +11 more
core   +1 more source

Feasibility of a ctDNA multigenic panel for non‐small‐cell lung cancer early detection and disease surveillance

open access: yesMolecular Oncology, EarlyView.
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy