Results 31 to 40 of about 3,289,244 (344)

The defintions of information and security; history of information security development

open access: yesVilnius University Open Series, 2020
Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed.
openaire   +3 more sources

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method

open access: yesIET Information Security
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang   +3 more
doaj   +1 more source

The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

open access: yes, 2009
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

The economics of user effort in information security [PDF]

open access: yes, 2009
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Low-rate Denial of Service attack detection method based on time-frequency characteristics

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj   +1 more source

Home - About - Disclaimer - Privacy