Results 51 to 60 of about 305,823 (288)
Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino +3 more
core +1 more source
Artificial Intelligence for Bone: Theory, Methods, and Applications
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan +3 more
wiley +1 more source
SECURE AND ENERGY AWARE TASK SCHEDULING IN CLOUD USING DEEP LEARNING AND CRYPTOGRAPHIC TECHNIQUES
Cloud Computing is one amid emerging technology greatly necessitated aiding computing on demand services by letting users for subsequent pay-per-use-on-demand scheme.
S Rekha, C Kalaiselvi
doaj
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Detecting web server take-over attacks through objective verification actions [PDF]
Attacks targeting web servers pose a major security threat. Typically prone to a mix of infrastructure and application-level security vulnerabilities, they serve as the lowest hanging fruit for intruders wanting to gain unauthorized access to the entire ...
Computer Science Annual Workshop CSAW’13 +2 more
core
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
Interest-Based Access Control for Content Centric Networks (extended version)
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar +3 more
core +1 more source
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source
Access Not Denied? The Role American Localities Can Play
San Francisco represents a unique case in the United States in that it has enacted a set of inclusive policies at the local level to increase unauthorized immigrants’ access to and utilization of health care. Based on interviews conducted with 36 primary
Helen B. Marrow
doaj
Bypassing Civil Gideon: A Legislative Proposal [PDF]
Eighty-four percent of immigrants appearing before immigration judges are unrepresented. Immigration judges are overwhelmed with the dual role of adjudicating cases and serving as counsel to pro se individuals appearing before them.
Corcoran, Erin B.
core +1 more source

