Results 1 to 10 of about 3,206,915 (290)
CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao +3 more
doaj +1 more source
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun +3 more
doaj +1 more source
Deep neural network-aided design of terahertz bifunctional metasurface
Based on the insulator-to-metal phase transition of vanadium dioxide (VO2), we present a bifunctional metasurface (MS), which can be switched between the two working states, i.e., a broadband absorber and a broadband polarization converter.
Yisong Lv +5 more
doaj +1 more source
Existing approaches to sharing of distributed medical data either provide only limited protection of patients’ privacy or sacrifice the accuracy of results.
David Froelicher +8 more
doaj +1 more source
Security of Data Science and Data Science for Security [PDF]
In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure.
Tellenbach, Bernhard +2 more
openaire +2 more sources
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
SECURING INTERNET OF THINGS DATA
Background. The Internet of Things as a concept and as a network is a multitude of objects, which can be either static or dynamic in nature. Those objects also must be identifiable and should be able to be integrated into communication networks related to both the physical world and the information world, Data provided by things is often personal.
Globa, Larysa +3 more
openaire +6 more sources
The acceleration of urbanization and the increasing demand for precise city planning have made the extraction of buildings and roads from remote sensing images crucial.
Ziyi Chen +5 more
doaj +1 more source
On the Security of Individual Data [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Demetrovics, János +2 more
openaire +1 more source
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources

