Results 41 to 50 of about 3,352,449 (323)

Mathematical approximator based on basic spline approximation [PDF]

open access: yesE3S Web of Conferences
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon   +5 more
doaj   +1 more source

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

Information Security Games: A Survey [PDF]

open access: yesarXiv, 2021
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv  

The defintions of information and security; history of information security development

open access: yesVilnius University Open Series, 2020
Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed.
openaire   +3 more sources

Information Security Management [PDF]

open access: yesHOLISTICA – Journal of Business and Public Administration, 2020
Abstract Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach.
Santosh Yalamanchili   +2 more
openaire   +3 more sources

Security and Information

open access: yes, 2020
With the argument that society needs to have certain products and / or services, the constituted powers create public bodies that are properly structured to act in a certain line of activity, such as education, security, health, social welfare, etc. In this way, they provide products and / or services directly to the population, who pay for them by ...
openaire   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Information Security management: A human challenge? [PDF]

open access: yes, 2008
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core   +1 more source

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Polyfunctional CD8+CD226+RUNX2hi effector T cells are diminished in advanced stages of chronic lymphocytic leukemia

open access: yesMolecular Oncology, EarlyView.
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy