Results 1 to 10 of about 1,098,300 (103)

Soft Constraint Programming to Analysing Security Protocols [PDF]

open access: yesTPLP 4(5-6): 545-572 (2004), 2003
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
arxiv   +4 more sources

PPCA: Privacy-preserving Principal Component Analysis Using Secure Multiparty Computation(MPC) [PDF]

open access: yesarXiv, 2021
Privacy-preserving data mining has become an important topic. People have built several multi-party-computation (MPC)-based frameworks to provide theoretically guaranteed privacy, the poor performance of real-world algorithms have always been a challenge.
Fan, Xiaoyu   +4 more
arxiv   +3 more sources

Belief Semantics of Authorization Logic [PDF]

open access: yesarXiv, 2013
Authorization logics have been used in the theory of computer security to reason about access control decisions. In this work, a formal belief semantics for authorization logics is given. The belief semantics is proved to subsume a standard Kripke semantics.
Clarkson, Michael R., Hirsch, Andrew K.
arxiv   +3 more sources

Integrating PCA and DEA techniques for strategic assessment of network security [PDF]

open access: yesComputational Algorithms and Numerical Dimensions, 2023
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj   +1 more source

Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]

open access: yesIEEE Transactions on Sustainable Computing, 2021
Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Jun Feng   +5 more
openaire   +4 more sources

Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? [PDF]

open access: yesEnergy Informatics, 2021
AbstractDistributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements.
Sampath Kumar Venkatachary   +2 more
openaire   +4 more sources

Voice Feature Extraction for Gender and Emotion Recognition [PDF]

open access: yesITM Web of Conferences, 2021
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M.   +4 more
doaj   +1 more source

Anomaly based Intrusion Detection using Modified Fuzzy Clustering [PDF]

open access: yes, 2021
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information.
Harish, B S, Kumar, S V A
core   +1 more source

Network intrusion detection using oversampling technique and machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2022
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed   +2 more
doaj   +2 more sources

Security Implications of AI Chatbots in Health Care

open access: yesJournal of Medical Internet Research, 2023
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj   +1 more source

Home - About - Disclaimer - Privacy