Results 1 to 10 of about 4,466,881 (184)

Secure Scrum: Development of Secure Software with Scrum [PDF]

open access: yesarXiv, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
arxiv   +2 more sources

Declaración Conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero 2023) – Déclaration Conjointe XXème Réunion de Haut Niveau Maroc-Espagne 1er et 2 Février 2023)

open access: yesPaix et Sécurité Internationales, 2023
DOCUMENTO 1. Declaración conjunta XII Reunión de Alto Nivel Marruecos-España (1-2 de febrero de 2023). DOCUMENTO 2. Déclaration-conjointe XIIème Réunion de Haut Niveau Maroc-Espagne (1er et 2 Février 2023)
Peace & Security
doaj   +1 more source

Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés)

open access: yesPaix et Sécurité Internationales, 2023
Peace & Security. (2023). Resolución del Parlamento Europeo, de 19 de enero de 2023, sobre la situación de los periodistas marroquíes, en particular el caso de Omar Radi (español e inglés).
Peace & Security (ES)
doaj   +1 more source

Research on tor-based anonymous DDoS attack [PDF]

open access: yesMATEC Web of Conferences, 2021
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui   +4 more
doaj   +1 more source

Security Reputation Metrics [PDF]

open access: yesEncyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, 2021, 2023
Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security ...
arxiv   +1 more source

Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods

open access: yesHe huaxue yu fangshe huaxue, 2023
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan   +10 more
doaj   +1 more source

Lessons from a Space Lab: An Image Acquisition Perspective

open access: yesInternational Journal of Aerospace Engineering, 2023
The use of deep learning (DL) algorithms has improved the performance of vision-based space applications in recent years. However, generating large amounts of annotated data for training these DL algorithms has proven challenging.
Leo Pauly   +12 more
doaj   +1 more source

Deep learning-based solution for smart contract vulnerabilities detection

open access: yesScientific Reports, 2023
This paper aims to explore the application of deep learning in smart contract vulnerabilities detection. Smart contracts are an essential part of blockchain technology and are crucial for developing decentralized applications.
Xueyan Tang   +4 more
doaj   +1 more source

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]

open access: yesPeerJ Computer Science, 2023
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou   +6 more
doaj   +2 more sources

Refinement of an ovine-based immunoglobulin therapy against SARS-CoV-2, with comparison of whole IgG versus F(ab′)2 fragments

open access: yesScientific Reports, 2023
The development of new therapies against SARS-CoV-2 is required to extend the toolkit of intervention strategies to combat the global pandemic. In this study, hyperimmune plasma from sheep immunised with whole spike SARS-CoV-2 recombinant protein has ...
Stephen Findlay-Wilson   +23 more
doaj   +1 more source

Home - About - Disclaimer - Privacy