Results 51 to 60 of about 1,753,778 (277)
As one of the top ten security threats faced by artificial intelligence, the adversarial attack has caused scholars to think deeply from theory to practice.
Fangwei Wang +4 more
doaj +1 more source
Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency [PDF]
In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems.
Drs. Lingga Hermanto, MM Drs. Lingga Hermanto, MM +1 more
core
Learning to Customize Network Security Rules
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705) +4 more
core +6 more sources
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj +1 more source
A Hybrid Multi-Scale Transformer-CNN UNet for Crowd Counting
Crowd counting is a critical computer vision task with significant applications in public security and smart city systems. While deep learning has markedly improved accuracy, persistent challenges include extreme scale variations, severe occlusion, and ...
Kai Zhao +3 more
doaj +1 more source
Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao +2 more
core +1 more source
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao +6 more
wiley +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source

