Results 21 to 30 of about 1,052,863 (298)

A remote attestation mechanism using group signature for the perception layer in centralized networking

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
As the important transmission approach of the perception data, the security and privacy of the perception layer nodes have been paid more and more attention.
Jing Huang   +4 more
doaj   +1 more source

Weight-Variable Scattering Convolution Networks and Its Application in Electromagnetic Signal Classification

open access: yesIEEE Access, 2019
Deep learning is an important support for the development of cognitive communication in the cognitive Internet of Things (IoT). Deep convolution neural networks have powerful functional expression and feature extraction capabilities.
Huaji Zhou   +6 more
doaj   +1 more source

Women\u2019s human rights when experiencing humanitarian crises and conflicts: the impact of United Nations Security Council Resolutions on women, peace, security, and the CEDAW General Recommendation no. 30. [PDF]

open access: yes, 2018
Violence and insecurity are strictly linked to unequal political, social, and economic power. However, the continuity of violence is obscured by masculinist and patriarchal rules of security within gendered structures, especially inside the division of ...
CEDAW   +15 more
core   +1 more source

ChinaVis Data Challenge from 2015 to 2017

open access: yes网络与信息安全学报, 2018
The evolution of the ChinaVis Data Challenge from its origin 2015 to 2017 was presented. Firstly, the background and organization of the Data Challenge were introduced.
ZHAO Ying, ZHANG Zhuo, YUAN Xiaoru
doaj   +1 more source

THE EFFECT OF SOCIOECONOMIC FACTORS, FEAR OF CRIME AND SOCIAL MOBILIZATION IN THE EVALUATION OF THE JUDICIARY DECISIONS

open access: yesRevista Galega de Economía, 2023
Crimes related to sexual abuse or rape provoke great social mobilizations, as happened with the gang called “la manada”. How the aftermath of the social mobilizations and socioeconomic factors influence the perception of security and the perception of ...
Manuel Ruiz-Adame   +2 more
doaj   +1 more source

The Swedish Perception of European Security in the Light of the Crisis in Ukraine [PDF]

open access: yes, 2016
The events in Ukraine, the annexation of Crimea, and the Russian attitude towards Ukraine show an evident change in European relations. The escalation of conflict between Russia and Ukraine however does not affect only those two countries, but also those
Kobierecka, Anna
core   +3 more sources

Quantifying Perception of Security Through Social Media and Its Relationship With Crime

open access: yesIEEE Access, 2021
The perception of security refers to the subjective evaluation of risks related to security events and the magnitude of their consequences. Negative perceptions have severe implications in society. These feelings are commonly quantified by citizen’
Luisa Fernanda Chaparro   +7 more
doaj   +1 more source

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Investigation of The Perceptions of Safety and Confidence Against Violence of Healthcare Professionals

open access: yesSağlık ve Hemşirelik Yönetimi Dergisi
Aim: In the study was carried out to determine the frequency of exposure to violence in the working environment and the perceptions of security and trust against violence. Method: The study is a descriptive, cross-sectional and correlational research.
Burak Yural   +2 more
doaj   +1 more source

Security of Quantum Key Distribution

open access: yes, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core   +1 more source

Home - About - Disclaimer - Privacy