Results 21 to 30 of about 543,621 (317)

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Inverse privacy

open access: yesCommunications of the ACM, 2016
Seeking a market-based solution to the problem of a person's unjustified inaccessibility to their private information.
Gurevich, Yuri   +2 more
openaire   +2 more sources

Bistochastic Privacy

open access: yes, 2022
We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and column-wise. This class of matrices is used to both define privacy guarantees and a tool to apply protection on a data set.
Ruiz, Nicolas, Domingo-Ferrer, Josep
openaire   +2 more sources

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies

open access: yesNature Communications
Genome-wide association studies help uncover genetic influences on complex traits and diseases. Importantly, multi-site data collaborations enhance the statistical power of these studies but pose challenges due to the sensitivity of genomic data ...
Arjhun Swaminathan   +4 more
doaj   +1 more source

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

Privacy Protocols

open access: yes, 2019
38 pages, 6 ...
Castiglione, Jason   +2 more
openaire   +2 more sources

Survival for Children Diagnosed With Wilms Tumour (2012–2022) Registered in the UK and Ireland Improving Population Outcomes for Renal Tumours of Childhood (IMPORT) Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga   +56 more
wiley   +1 more source

Home - About - Disclaimer - Privacy