Results 21 to 30 of about 2,927,610 (300)
Published incidents and their proportions of human error [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M. +3 more
core +1 more source
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu +4 more
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang +4 more
doaj +1 more source
Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li +4 more
doaj +1 more source
A Data Enhancement Algorithm for DDoS Attacks Using IoT
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv +4 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
ObjectiveTo study the cooling reaction kinetic characteristics of the temperature difference between cadaver temperature and ambient temperature (hereinafter referred to as “cadaver temperature difference”) according to the reaction kinetics method ...
DUAN Xiao-fei +5 more
doaj +1 more source
Adaptively-Secure Distributed Public-Key Systems
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Frankel, Yair +2 more
openaire +2 more sources
Constitutional Limits on Private Policing and the State’s Allocation of Force [PDF]
This Note argues that a variety of private police forces, such as university patrols and residential security guards, should. be held to the constitutional limitations found in the Bill of Rights.
Enion, M. Rhead
core +1 more source
Security in Wireless Sensor Networks: Issues and Challenges [PDF]
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core +3 more sources

