Results 31 to 40 of about 3,238,646 (347)

Airports at Risk: The Impact of Information Sources on Security Decisions [PDF]

open access: yes, 2012
Security decisions in high risk organizations such as airports involve obtaining ongoing and frequent information about potential threats. Utilizing questionnaire survey data from a sample of airport employees in European Airports across the continent ...
A Angenendt   +22 more
core   +1 more source

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

"NO" SECURITY OF INFORMATION TECHNOLOGY [PDF]

open access: yesModern Management Review, 2020
Using the Internet is inseparably connected with building the awareness of its users, hence the  tasks that arise for a modern man in relation to information technologies, especially in terms  of online threats. Children are particularly vulnerable.
openaire   +3 more sources

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

Paradoxes in Information Security

open access: yesIEEE Potentials, 2016
In this article, we approach information security from a novel perspective as we examine its unintended ramifications and its paradoxes. Information security and cybersecurity are necessities of modern societies. Simply put, services that are based on information and communication technologies would not function without information security.
Jukka Vuorinen, Pekka Tetri
openaire   +3 more sources

Mathematical approximator based on basic spline approximation [PDF]

open access: yesE3S Web of Conferences
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon   +5 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a
Volodymyr Korchynskyi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy