Results 21 to 30 of about 2,955,878 (304)

Private military and security companies, territoriality and the transformation of western security governance [PDF]

open access: yes, 2012
The field of security governance holds a special place within the context of the debate over the diffusion of power from state to non-state actors, from national to international authorities and from governments to markets in Western democracies.
Krahmann, E
core   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

Published incidents and their proportions of human error [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M.   +3 more
core   +1 more source

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy