Results 41 to 50 of about 446,967 (129)
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen +2 more
core +1 more source
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj +1 more source
Clinical software development for the Web: lessons learned from the BOADICEA project
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P +2 more
doaj +1 more source
Caching and Auditing in the RPPM Model
Crampton and Sellwood recently introduced a variant of relationship-based access control based on the concepts of relationships, paths and principal matching, to which we will refer as the RPPM model.
G. Edjlali, K. Krukow, Q. Wei, Y. Cheng
core +1 more source
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy +6 more
doaj +1 more source
SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition
Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples.
Ran Wei +5 more
doaj +1 more source
Training Process Reduction Based On Potential Weights Linear Analysis To Accelarate Back Propagation Network [PDF]
Learning is the important property of Back Propagation Network (BPN) and finding the suitable weights and thresholds during training in order to improve training time as well as achieve high accuracy.
Asadi, Roya +2 more
core +1 more source
The Internet of Things Connectivity Binge: What are the Implications? [PDF]
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services ...
Janna Anderson, Lee Rainie
core
The paper deals with methodological approaches and practical venues of international cooperation in the areas of information security and cybersecurity on railway transport. The approaches were adopted by the workshop “Cybersecurity on Railway Transport”
S. E. Adadurov +3 more
doaj
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas +4 more
core +1 more source

