Results 11 to 20 of about 150,216 (340)
Die Trusted Computing Initiative ist ein Zusammenschluss mehrerer Soft- und Hardwarehersteller, die sich zum Ziel gesetzt haben, Computersysteme sicherer zu machen. Es wird allgemein angenommen, dass Hardware schwerer zu manipulieren ist als Software. Vorhandene hardwaregestützte Sicherheitsmechanismen, wie z.B.
Hoffmann, Johannes, Neubauer, Johannes
openaire +4 more sources
A novel GAN-based regression model for predicting frying oil deterioration
Frying is a common food processing method because fried food is popular with consumers for its attractive colour and crisp taste. What’s concerning is that the complex physical and chemical reactions occurring during deep frying are harmful to the well ...
Kai Ye+7 more
doaj +1 more source
Trust and Trusted Computing Platforms [PDF]
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent in computing systems. In this paper, a result of the Software Engineering Institute's Independent Research and Development Project "Trusted Computing in Extreme Adversarial Environments: Using Trusted Hardware as a Foundation for Cyber ...
Jonathan M. McCune+2 more
openaire +2 more sources
Cyber Security for Multi-Station Integrated Smart Energy Stations: Architecture and Solutions
Multi-station integration is motivated by the requirements of distributed energies interconnection and improvements in the efficiency of energy systems.
Yangrong Chen+5 more
doaj +1 more source
A Semantic Aware Meta-Path Model for Heterogeneous Network Representation Learning
Heterogeneous graph representation learning is to learn effective representations for nodes or (sub)graphs, which preserve node attributes and structural information. However, it is challenging to design a representation learning method for heterogeneous
Yiping Yang+3 more
doaj +1 more source
Bert-Enhanced Text Graph Neural Network for Classification
Text classification is a fundamental research direction, aims to assign tags to text units. Recently, graph neural networks (GNN) have exhibited some excellent properties in textual information processing. Furthermore, the pre-trained language model also
Yiping Yang, Xiaohui Cui
doaj +1 more source
Challenges for Trusted Computing
Trusted computing is proving to be one of the most controversial technologies in recent years. Rather than become embroiled in the debate over possible (mis)appropriations of its technologies, the authors highlight some of the technical obstacles that might hinder trusted computing's widespread adoption.
Balfe, S.+3 more
openaire +8 more sources
A Heterogeneous Graph Enhanced LSTM Network for Hog Price Prediction Using Online Discussion
Forecasting the prices of hogs has always been a popular field of research. Such information has played an essential role in decision-making for farmers, consumers, corporations, and governments.
Kai Ye+3 more
doaj +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar+3 more
core +4 more sources
MFF-Net: Deepfake Detection Network Based on Multi-Feature Fusion
Significant progress has been made in generating counterfeit images and videos. Forged videos generated by deepfaking have been widely spread and have caused severe societal impacts, which stir up public concern about automatic deepfake detection ...
Lei Zhao+3 more
doaj +1 more source