Results 11 to 20 of about 543,621 (317)

Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]

open access: yesپژوهش‌نامه حقوق اسلامی, 2013
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi   +2 more
doaj   +1 more source

Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective

open access: yesIEEE Access, 2021
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Adversarial attack and defense in reinforcement learning-from AI security view

open access: yesCybersecurity, 2019
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen   +5 more
doaj   +1 more source

Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks

open access: yesIEEE Access, 2022
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao   +4 more
doaj   +1 more source

Genomic Privacy [PDF]

open access: yesClinical Chemistry, 2018
Abstract BACKGROUND Genetic information is unique among all laboratory data because it not only informs the current health of the specific person tested but may also be predictive of the future health of the individual and, to varying degrees, all biological relatives.
Abraham P, Schwab   +3 more
openaire   +2 more sources

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

LSGAN-AT: enhancing malware detector robustness against adversarial examples

open access: yesCybersecurity, 2021
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang   +4 more
doaj   +1 more source

Numerical Evaluation of Job Finish Time Under MTD Environment

open access: yesIEEE Access, 2020
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen   +3 more
doaj   +1 more source

On ADS-B Sensor Placement for Secure Wide-Area Multilateration

open access: yesProceedings, 2020
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh   +3 more
doaj   +1 more source

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

open access: yesIEEE Access, 2017
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy