Results 101 to 110 of about 151,861 (137)
Some of the next articles are maybe not open access.
Unsupervised Ensemble-Kernel Principal Component Analysis for Hyperspectral Anomaly Detection
2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2020Unsupervised anomaly detection–which aims to identify outliers in data sets without the use of labeled training data–is critically important across a variety of domains including medicine, security, defense, finance, and imaging. In particular, detection
Nicholas Merrill, C. Olson
semanticscholar +1 more source
International Conference on Climate Informatics, 2020
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar +1 more source
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar +1 more source
International Journal on Advanced Science, Engineering and Information Technology, 2020
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid +2 more
semanticscholar +1 more source
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid +2 more
semanticscholar +1 more source
An Overview on Data Security in Cloud Computing
arXiv.org, 2018Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and ...
Lynda Kacha, Abdelhafid Zitouni
semanticscholar +1 more source
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023
Merin Thomas +5 more
semanticscholar +1 more source
Merin Thomas +5 more
semanticscholar +1 more source
Intrusion Detection on Self Organizing Network using PCA and Random Forest
2025 5th International Conference on Soft Computing for Security Applications (ICSCSA)There are several hazards to internet security as a result of the development of network technology. One cannot stress how crucial intrusion detection systems (IDS) are to network and computer security.
T. Yousuf +5 more
semanticscholar +1 more source
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
International Symposium on Human Aspects of Information Security and Assurance, 2022Najla Aldaraani +2 more
semanticscholar +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Best Available Technologies (BATs) for Computer Security
, 1981C. Landwehr
semanticscholar +1 more source

