Results 1 to 10 of about 265,702 (184)

A Lightweight Multi-View Learning Approach for Phishing Attack Detection Using Transformer with Mixture of Experts

open access: yesApplied Sciences, 2023
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang   +4 more
doaj   +1 more source

On secrecy above secrecy capacity [PDF]

open access: yes2012 IEEE International Conference on Communication Systems (ICCS), 2012
5 Pages, 2 Figures, Submitted to ICCS ...
Ramachandran Rajesh   +2 more
openaire   +2 more sources

Secrecy, Suspicion, Exposure: Negotiating Authority Structures in a Settler Colonial Society as Depicted in Walter Van Tilburg Clark’s The Ox-Bow Incident

open access: yesEuropean Journal of American Studies, 2021
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj   +1 more source

The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance

open access: yesConstitutionale, 2023
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj   +1 more source

Optimized Artificial Bee Colony Algorithm with Markov Chain

open access: yesJisuanji kexue yu tansuo, 2020
The shortcomings of the artificial bee colony algorithm (ABC) and its improved algorithm are analyzed. This paper proposes the improved Markov ABC (IMABC) dividing the ABC algorithm into two stages by verifying the Markov property of the artificial bee ...
GUO Jia, MA Chaobin, ZHANG Shaobo, MIAO Mengmeng
doaj   +1 more source

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

open access: yesSensors, 2021
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous   +5 more
doaj   +1 more source

Broken Latin, Secret Europe: Benjamin, Celan, Derrida

open access: yesEidos. A Journal for Philosophy of Culture, 2021
The author begins by analyzing Walter Benjamin’s quarrel with George Kreis and the respective visions of culture advocated by both sides of the debate.
Adam Lipszyc
doaj   +1 more source

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +1 more source

Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm

open access: yesJisuanji kexue yu tansuo, 2020
At present, the election based distributed consistency algorithm (Paxos like algorithm) applied in distri-buted system is elected by more than 50% of the voters.
LI Bin, JIANG Jianguo
doaj   +1 more source

The costs of secrecy [PDF]

open access: yesScience, 2020
“Without freedom of speech there is no modern world, just a barbaric one.” These words from China's most famous artist and activist, Ai Weiwei, have never been more important. Ai Weiwei would probably agree that China's actions in the coronavirus crisis require the voice of the scientific community, and he wouldn't be surprised that getting folks to ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy