Results 41 to 50 of about 446,967 (129)

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Industrial development of near-open pit reserves based on multivariate analysis and computer modelling of geotechnology objects

open access: yesVestnik MGTU, 2019
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj   +1 more source

Clinical software development for the Web: lessons learned from the BOADICEA project

open access: yesBMC Medical Informatics and Decision Making, 2012
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P   +2 more
doaj   +1 more source

Caching and Auditing in the RPPM Model

open access: yes, 2014
Crampton and Sellwood recently introduced a variant of relationship-based access control based on the concepts of relationships, paths and principal matching, to which we will refer as the RPPM model.
G. Edjlali, K. Krukow, Q. Wei, Y. Cheng
core   +1 more source

An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System

open access: yesIEEE Access
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy   +6 more
doaj   +1 more source

SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition

open access: yesBig Data Mining and Analytics
Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples.
Ran Wei   +5 more
doaj   +1 more source

Training Process Reduction Based On Potential Weights Linear Analysis To Accelarate Back Propagation Network [PDF]

open access: yes, 2009
Learning is the important property of Back Propagation Network (BPN) and finding the suitable weights and thresholds during training in order to improve training time as well as achieve high accuracy.
Asadi, Roya   +2 more
core   +1 more source

The Internet of Things Connectivity Binge: What are the Implications? [PDF]

open access: yes, 2017
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services ...
Janna Anderson, Lee Rainie
core  

International Cybersecurity on Railway Transport: Methodological Approaches and Normal Procedural Framework

open access: yesВестник Научно-исследовательского института железнодорожного транспорта, 2015
The paper deals with methodological approaches and practical venues of international cooperation in the areas of information security and cybersecurity on railway transport. The approaches were adopted by the workshop “Cybersecurity on Railway Transport”
S. E. Adadurov   +3 more
doaj  

Knowledge Flow Analysis for Security Protocols

open access: yes, 2005
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy