Results 211 to 220 of about 214,314 (238)
Some of the next articles are maybe not open access.
SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks
IEEE Transactions on Network and Service Management, 2021The security and privacy of the end-users are a few of the most important components of a communication network. Though end-to-end encryption (e.g., TLS/SSL) fulfils this requirement, it makes inspecting network traffic with legacy solutions such as Deep
C. Kattadige +6 more
semanticscholar +1 more source
SETA: Semantic-Aware Edge-Guided Token Augmentation for Domain Generalization
IEEE Transactions on Image ProcessingDomain generalization (DG) aims to enhance the model robustness against domain shifts without accessing target domains. A prevalent category of methods for DG is data augmentation, which focuses on generating virtual samples to simulate domain shifts ...
Jintao Guo +3 more
semanticscholar +1 more source
SETA and Security Behavior: Mediating Role of Employee Relations, Monitoring, and Accountability
Journal of Global Information Management, 2019This article contends that information security education, training and awareness programs can improve employee security behavior. Empirical studies have analyzed the direct effects of employee security training on security behavior without taking into ...
Winfred Yaokumah +2 more
semanticscholar +1 more source
Intra-lenticular caterpillar seta in ophthalmia nodosa
European Journal of Ophthalmology, 2019Purpose: To report the clinical course of ophthalmia nodosa with a retained lenticular seta misdiagnosed and treated as non-infectious posterior uveitis for 7 consecutive years. Methods: Meticulous clinical examination led to discovery of the caterpillar
Arshi Singh, U. Behera, Hitesh Agrawal
semanticscholar +1 more source
A novel SETA-based gamification framework to raise cybersecurity awareness
International journal of information technology, 2021F. Abu-Amara +4 more
semanticscholar +1 more source
SÉTA: Supersingular Encryption from Torsion Attacks
IACR Cryptology ePrint Archive, 2019Cyprien Delpech de Saint Guilhem +3 more
semanticscholar +1 more source
S-SETA: Selective Software-Only Error-Detection Technique Using Assertions
IEEE Transactions on Nuclear Science, 2015E. Chielle +6 more
semanticscholar +1 more source

