Results 31 to 40 of about 7,114,774 (349)

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

open access: yesJournal of Information Security and Applications, 2020
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches.
M. Ferrag   +3 more
semanticscholar   +1 more source

Detecting Unauthorized Movement of Radioactive Material Packages in Transport with an Adam-Optimized BP Neural Network Model

open access: yesScience and Technology of Nuclear Installations, 2023
The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials.
Panpan Jiang   +7 more
doaj   +1 more source

Particle Propagation Model for Dynamic Node Classification

open access: yesIEEE Access, 2020
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li   +4 more
doaj   +1 more source

The SmartAG partner: CCAFS East Africa Bi-Annual Newsletter, July - December 2019 [PDF]

open access: yes, 2020
We are pleased to share with you our SmartAg Partner bi-annual newsletter, highlighting policy engagement, ongoing research, field updates and activities with partners from the second half of ...
CGIAR Research Program on Climate Change, Agriculture and Food Security
core  

Symbolic Quantitative Information Flow [PDF]

open access: yes, 2012
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P   +3 more
core   +1 more source

5G Security Threat Assessment in Real Networks

open access: yesSensors, 2021
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park   +5 more
doaj   +1 more source

The Transport Layer Security (TLS) Protocol Version 1.3

open access: yesRequest for Comments, 2008
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
E. Rescorla
semanticscholar   +1 more source

Reclaiming the political : emancipation and critique in security studies [PDF]

open access: yes, 2012
The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced.
Alker H   +42 more
core   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +1 more source

Home - About - Disclaimer - Privacy