Results 21 to 30 of about 3,238,646 (347)

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

The LBC-3 lightweight encryption algorithm

open access: yesOpen Engineering, 2022
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule   +3 more
doaj   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

Security of Information and Networks

open access: yesThe Scientific World Journal, 2015
This special issue aims to make people aware and up to date of the innovative research in the area of emerging techniques and methods in security of information and network. The majority of organizations in the commercial and government sectors are relying completely on their computer and network systems. Extensive attacks can cause heavy loss in a few
Iftikhar Ahmad   +3 more
openaire   +4 more sources

5G wireless P2MP backhaul security protocol: an adaptive approach

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim   +4 more
doaj   +1 more source

The Information Security of Enterprises and Citizens' Security Context

open access: yesCommunications, 2005
The aim of the article to show the analogical procedures encountered while dealing with the security of a company or personal security. Security of Information Systems relates closely to modern-day life and the solution of crisis situations is but one ...
Roman Jasek
doaj   +1 more source

Risk management-based security evaluation model for telemedicine systems

open access: yesBMC Medical Informatics and Decision Making, 2020
Background Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections.
Dong-won Kim   +2 more
doaj   +1 more source

Research on tor-based anonymous DDoS attack [PDF]

open access: yesMATEC Web of Conferences, 2021
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui   +4 more
doaj   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy