Results 1 to 10 of about 4,466,881 (184)
Secure Scrum: Development of Secure Software with Scrum [PDF]
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
arxiv +2 more sources
DOCUMENTO 1. Declaración conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero de 2023). DOCUMENTO 2. Déclaration-conjointe XIIème Réunion de Haut Niveau Maroc-Espagne (1er et 2 Février 2023)
Peace & Security
doaj +1 more source
Peace & Security. (2023). Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés).
Peace & Security (ES)
doaj +1 more source
Research on tor-based anonymous DDoS attack [PDF]
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui+4 more
doaj +1 more source
Security Reputation Metrics [PDF]
Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security ...
arxiv +1 more source
Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan+10 more
doaj +1 more source
Lessons from a Space Lab: An Image Acquisition Perspective
The use of deep learning (DL) algorithms has improved the performance of vision-based space applications in recent years. However, generating large amounts of annotated data for training these DL algorithms has proven challenging.
Leo Pauly+12 more
doaj +1 more source
Deep learning-based solution for smart contract vulnerabilities detection
This paper aims to explore the application of deep learning in smart contract vulnerabilities detection. Smart contracts are an essential part of blockchain technology and are crucial for developing decentralized applications.
Xueyan Tang+4 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou+6 more
doaj +2 more sources
The development of new therapies against SARS-CoV-2 is required to extend the toolkit of intervention strategies to combat the global pandemic. In this study, hyperimmune plasma from sheep immunised with whole spike SARS-CoV-2 recombinant protein has ...
Stephen Findlay-Wilson+23 more
doaj +1 more source