Results 1 to 10 of about 1,764,419 (291)

Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing [PDF]

open access: yesSensors, 2023
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable.
Kyungroul Lee, Kangbin Yim
doaj   +2 more sources

Review of Visual Question Answering Technology [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Visual question answering (VQA) is a popular cross-modal task that combines natural language pro-cessing and computer vision techniques. The main objective of this task is to enable computers to intelligently recognize and retrieve visual content and ...
WANG Yu, SUN Haichun
doaj   +1 more source

Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]

open access: yesJisuanji gongcheng, 2023
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj   +1 more source

Management on biotic stress to improve the nutmeg quality in North Moluccas, Indonesia [PDF]

open access: yesE3S Web of Conferences, 2021
Indonesia dominates about 76% of nutmeg production and export in the world, where around 28.26% is produced in North Moluccas and 24.25% of its from North Halmahera.
Assagaf Muhammad   +6 more
doaj   +1 more source

Node Label Classification Algorithm Based on Structural Depth Network Embedding Model [PDF]

open access: yesJisuanji kexue, 2022
In the era of Internet,where massive data is growing explosively,traditional algorithms have been unable to meet the needs of processing large-scale and multi type data.In recent years,the latest graph embedding algorithm has achieved excellent results ...
CHEN Shi-cong, YUAN De-yu, HUANG Shu-hua, YANG Ming
doaj   +1 more source

Novel Data-Driven Distributed Learning Framework for Solving AC Power Flow for Large Interconnected Systems

open access: yesIEEE Open Access Journal of Power and Energy, 2021
Recent advancement in power systems induces complexity in large-scale interconnected systems and poses challenges in performing security assessment studies at various operating conditions. Traditional model-based methods are computationally intensive and
Bharat Vyakaranam   +10 more
doaj   +1 more source

Cyber Security Risk Assessment

open access: yesEconomica, 2021
The COVID-19 pandemic has accelerated the digitization of business processes, remote work/ access to sensitive data and critical corporate resources. There is a fast expansion of cloud computing services. The cybercrime follows the same trend: the sudden rise of global ransomware attacks, theft and disclosure of personal data, attacks on news sites ...
Valentin BRICEAG, Tudor BRAGARU
openaire   +2 more sources

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

High-performance computing for static security assessment of large power systems

open access: yesConnection Science, 2023
Contingency analysis (CA) is one of the essential tools for the optimal design and security assessment of a reliable power system. However, its computational requirements rise with the growth of distributed generations in the interconnected power system.
Venkateswara Rao Kagita   +4 more
doaj   +1 more source

Research on Malicious Code Family Classification Combining Attention Mechanism

open access: yesJisuanji kexue yu tansuo, 2021
In recent years, with the diversification of malicious code family and the enhancement of confounding countermeasures, traditional detection methods for malicious code are difficult to achieve good classification effect.
WANG Runzheng, GAO Jian, TONG Xin, YANG Mengqi
doaj   +1 more source

Home - About - Disclaimer - Privacy