Results 11 to 20 of about 5,288,295 (302)
Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core +12 more sources
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Lazar Stošić, Dragan Veličković
openaire +2 more sources
Attendees at 6:30 P.M. Meeting [PDF]
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core +1 more source
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
SARS-CoV-2 variants of concern have been associated with reduced vaccine effectiveness, even after a booster dose. In this study, authors aim to estimate vaccine effectiveness against hospitalisation with the Omicron and Delta variants, using different ...
Julia Stowe +4 more
doaj +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang +6 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou +6 more
doaj +2 more sources
Secure Blocking + Secure Matching = Secure Record Linkage [PDF]
Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage.
Alexandros Karakasidis +1 more
openaire +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
Social Security Programs Throughout the World: Africa, 2011 [PDF]
[Excerpt] This third issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of Africa. The combined findings of this series, which also includes volumes on Europe, Asia and the Pacific, and the ...
International Social Security Association +1 more
core +4 more sources

