Results 1 to 10 of about 275,240 (330)

Secrecy, Betrayal and Crime [PDF]

open access: diamondUtrecht Law Review, 2011
In the past few years numerous secret transgressions and crimes have been revealed in the media. Whistleblowers reveal clandestine agreements between managers and directors of large companies; criminals (pentiti) make deals with criminal justice ...
Dina Siegel
doaj   +2 more sources

A Lightweight Multi-View Learning Approach for Phishing Attack Detection Using Transformer with Mixture of Experts

open access: yesApplied Sciences, 2023
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang   +4 more
doaj   +1 more source

Secrecy, Suspicion, Exposure: Negotiating Authority Structures in a Settler Colonial Society as Depicted in Walter Van Tilburg Clark’s The Ox-Bow Incident

open access: yesEuropean Journal of American Studies, 2021
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj   +1 more source

On secrecy above secrecy capacity [PDF]

open access: yes2012 IEEE International Conference on Communication Systems (ICCS), 2012
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R.   +2 more
openaire   +2 more sources

The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance

open access: yesConstitutionale, 2023
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj   +1 more source

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

open access: yesSensors, 2021
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous   +5 more
doaj   +1 more source

Optimized Artificial Bee Colony Algorithm with Markov Chain

open access: yesJisuanji kexue yu tansuo, 2020
The shortcomings of the artificial bee colony algorithm (ABC) and its improved algorithm are analyzed. This paper proposes the improved Markov ABC (IMABC) dividing the ABC algorithm into two stages by verifying the Markov property of the artificial bee ...
GUO Jia, MA Chaobin, ZHANG Shaobo, MIAO Mengmeng
doaj   +1 more source

Broken Latin, Secret Europe: Benjamin, Celan, Derrida

open access: yesEidos. A Journal for Philosophy of Culture, 2021
The author begins by analyzing Walter Benjamin’s quarrel with George Kreis and the respective visions of culture advocated by both sides of the debate.
Adam Lipszyc
doaj   +1 more source

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +1 more source

On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]

open access: yes, 2012
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy