Results 11 to 20 of about 571,931 (308)

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +2 more sources

How to overcome «the surgical treatment» and not to cut

open access: yesБюллетень сибирской медицины, 2002
The questions of industrial property commercialization in the sphere of medicine are discussed. The reasons according to which the patenting of inventions in the sphere of medicine occurs with legal and financial difficulties are pointed out.
G. D. Tsesarskaya
doaj   +1 more source

Similarity Based Feature Transformation for Network Anomaly Detection

open access: yesIEEE Access, 2020
The fundamental objective behind any network intrusion detection system is to automate the detection process whenever intrusions occur in the network.
Arun Nagaraja   +5 more
doaj   +1 more source

Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea

open access: yesFrontiers in Marine Science, 2020
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui   +12 more
doaj   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Modeling Ice Melt Rates From Seawater Intrusions in the Grounding Zone of Petermann Gletscher, Greenland

open access: yesGeophysical Research Letters, 2023
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj   +1 more source

Machine Learning Algorithms for Raw and Unbalanced Intrusion Detection Data in a Multi-Class Classification Problem

open access: yesApplied Sciences, 2023
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications.
Mantas Bacevicius   +1 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

PTSD Among Healthcare Workers During the COVID-19 Outbreak: A Study Raises Concern for Non-medical Staff in Low-Risk Areas

open access: yesFrontiers in Psychiatry, 2021
Objective: To investigate the prevalence of sleep quality and post-traumatic stress disorder (PTSD) symptoms of healthcare workers (HCWs) and identify the determinants for PTSD symptoms among HCWs in high-risk and low-risk areas during the COVID-19 ...
Ruike Zhang   +13 more
doaj   +1 more source

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +2 more sources

Home - About - Disclaimer - Privacy