Results 1 to 10 of about 7,082,843 (395)

Decoding the shadows: multi-modal identity profiling in darknet markets using latent behavior feature fusion

open access: yesDiscover Applied Sciences
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang   +6 more
doaj   +1 more source

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

The efficiency of private enforcement of publik law claims in Estonia. Riiginõuete sissenõudmise efektiivsus Eestis

open access: yesEesti Majanduspoliitilised Väitlused, 2016
In Estonia, since 2001 the function of the enforcement of public law claims, such as fines or taxes, has been transferred to freelance bailiffs. The intention was to create profit motives for private enforcers to increase the effectiveness of the ...
Indrek Saar   +4 more
doaj   +1 more source

Publisher Correction: Refinement of an ovine-based immunoglobulin therapy against SARS-CoV-2, with comparison of whole IgG versus F(ab′)2 fragments

open access: yesScientific Reports, 2023
Stephen Findlay‑Wilson   +23 more
doaj   +1 more source

An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics

open access: yesIET Information Security
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu   +3 more
doaj   +1 more source

Family Security Insurance: A New Foundation for Economic Security [PDF]

open access: yes, 2010
A report released by Georgetown Law\u27s Workplace Flexibility 2010 and the Berkeley Center on Health, Economic & Family Security (Berkeley CHEFS) outlining a blueprint for establishing and financing a new national insurance program to provide wage ...
Berkeley Center on Health, Economic & Family Security, UC Berkeley School of Law   +1 more
core   +1 more source

A Survey of Techniques for Improving Security of GPUs

open access: yes, 2018
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'.
Abhinaya, S. B.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy