Results 31 to 40 of about 1,939,766 (365)
Digital technologies: tensions in privacy and data
Driven by data proliferation, digital technologies have transformed the marketing landscape. In parallel, significant privacy concerns have shaken consumer–firm relationships, prompting changes in both regulatory interventions and people’s own privacy ...
Sara Quach+4 more
semanticscholar +1 more source
Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi+2 more
doaj +1 more source
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim+3 more
doaj +1 more source
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
k-Anonymity: A Model for Protecting Privacy
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers.
L. Sweeney
semanticscholar +1 more source
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire +6 more sources
Multiple sclerosis clinical decision support system based on projection to reference datasets
Abstract Objective Multiple sclerosis (MS) is a multifactorial disease with increasingly complicated management. Our objective is to use on‐demand computational power to address the challenges of dynamically managing MS. Methods A phase 3 clinical trial data (NCT00906399) were used to contextualize the medication efficacy of peg‐interferon beta‐1a vs ...
Chadia Ed‐driouch+13 more
wiley +1 more source
The anterior nucleus of the thalamus plays a role in the epileptic network
Abstract Objectives We investigated both the metabolic differences and interictal/ictal discharges of the anterior nucleus of the thalamus (ANT) in patients with epilepsy to clarify the relationship between the ANT and the epileptic network. Methods Nineteen patients with drug‐resistant epilepsy who underwent stereoelectroencephalography were studied ...
Hao Yan+9 more
wiley +1 more source
Adversarial attack and defense in reinforcement learning-from AI security view
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen+5 more
doaj +1 more source
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim+5 more
doaj +1 more source