Results 21 to 30 of about 2,927,610 (300)

Published incidents and their proportions of human error [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M.   +3 more
core   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Cooling Kinetic Characteristics of Temperature Difference between Cadaver Temperature and Ambient Temperature

open access: yesFayixue Zazhi, 2022
ObjectiveTo study the cooling reaction kinetic characteristics of the temperature difference between cadaver temperature and ambient temperature (hereinafter referred to as “cadaver temperature difference”) according to the reaction kinetics method ...
DUAN Xiao-fei   +5 more
doaj   +1 more source

Adaptively-Secure Distributed Public-Key Systems

open access: yesTheoretical Computer Science, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Frankel, Yair   +2 more
openaire   +2 more sources

Constitutional Limits on Private Policing and the State’s Allocation of Force [PDF]

open access: yes, 2009
This Note argues that a variety of private police forces, such as university patrols and residential security guards, should. be held to the constitutional limitations found in the Bill of Rights.
Enion, M. Rhead
core   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

Home - About - Disclaimer - Privacy