Results 21 to 30 of about 760,777 (341)
Security of Information and Networks
This special issue aims to make people aware and up to date of the innovative research in the area of emerging techniques and methods in security of information and network. The majority of organizations in the commercial and government sectors are relying completely on their computer and network systems. Extensive attacks can cause heavy loss in a few
Iftikhar Ahmad+3 more
openaire +4 more sources
5G wireless P2MP backhaul security protocol: an adaptive approach
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim+4 more
doaj +1 more source
Composite Metrics for Network Security Analysis [PDF]
Security metrics present the security level of a system or a network in both qualitative and quantitative ways. In general, security metrics are used to assess the security level of a system and to achieve security goals. There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that are ...
arxiv +1 more source
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin+3 more
doaj +1 more source
The Information Security of Enterprises and Citizens' Security Context
The aim of the article to show the analogical procedures encountered while dealing with the security of a company or personal security. Security of Information Systems relates closely to modern-day life and the solution of crisis situations is but one ...
Roman Jasek
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,+7 more
doaj
Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li+4 more
doaj +1 more source
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting [PDF]
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the ...
arxiv +1 more source
A Data Enhancement Algorithm for DDoS Attacks Using IoT
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv+4 more
doaj +1 more source
"NO" SECURITY OF INFORMATION TECHNOLOGY [PDF]
Using the Internet is inseparably connected with building the awareness of its users, hence the tasks that arise for a modern man in relation to information technologies, especially in terms of online threats. Children are particularly vulnerable.
openaire +3 more sources