Results 21 to 30 of about 158,430 (308)

The Application of Kalman Filter Algorithm in Rail Transit Signal Safety Detection

open access: yesIEEE Access
With the speedy prosperity and popularization of wireless communication, the informatization and automation level of rail transit systems is also improved.
Zhinong Miao, Qilong Liao
doaj   +1 more source

Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]

open access: yesJisuanji kexue
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj   +1 more source

Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]

open access: yesJisuanji kexue
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj   +1 more source

KECO: toward efficient task offloading in mobile edge computing with federated knowledge distillation [PDF]

open access: yesPeerJ Computer Science
With the diversification and personalization of mobile user demands, as well as the rapid development of distributed computing technology, leveraging mobile edge computing task offloading to provide users with convenient services has become a research ...
Zhuang Liu, Dong Li, Panfei Yang
doaj   +2 more sources

Secure and Resilient Cyberattack Detection in ICS Networks: Hybrid Encryption, Protocol Hardening, and Threat Hunting on ELECTRA Modbus Traffic

open access: yesIEEE Access
This paper utilizes the ELECTRA Modbus dataset to present a secure and resilient anomaly detection framework for Industrial Control Systems (ICS). The proposed system integrates multiple machine learning models—including Random Forest, Neural ...
Archana Pallakonda   +4 more
doaj   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Security Testing With Python Scripts

open access: yesSmart Cities and Regional Development Journal, 2023
Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk
Frida ZISKO, Alma HYRA
doaj   +2 more sources

ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance

open access: yesIEEE Access, 2023
Organizations constantly exposed to cyber threats are compelled to comply with cyber security standards and policies for protecting their digital assets.
Mohamed Chahine Ghanem   +3 more
doaj   +1 more source

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Security assessment of the selected mobile platform

open access: yesJournal of Computer Sciences Institute, 2018
Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk
Aleksandra Iwaniuk
doaj   +1 more source

Home - About - Disclaimer - Privacy