Results 71 to 80 of about 305,823 (288)
Detecting Unauthorized Access of Personal Device
Unauthorized access to personal devices poses a severe concern to people's security and privacy in the digital age. The primary objective of this endeavour is to develop a dependable system for detecting and preventing such unauthorized access. The proposed system employs an interdisciplinary approach that integrates behaviour analysis, anomaly ...
S. Jerald Nirmal kumar +4 more
openaire +1 more source
Australia's Migration Strategy: An Effective Response to Migrant Worker Exploitation?
ABSTRACT A series of publicised migrant worker injuries and deaths has drawn attention to the issue of migrant worker exploitation (MWE) in Australia. In response, the Australian Government has included ‘Tackling Worker Exploitation’ as a key area of its Migration Strategy which it introduced in 2023. However, it is unclear how effective the Strategy’s
Evelyn Dowling, Alexandra Ridgway
wiley +1 more source
Diminishing the perceived need for black open access [PDF]
Conference paper and presentation slidesThe attention garnered by unauthorized sharing and pirating of scholarly content has resulted in a new category on the open access spectrum – black open access.
Baich, Tina
core
ABSTRACT In Australia, governments fund Community Legal Centres (CLCs) as part of the legal assistance sector (LAS) to meet the ‘legal needs’ of people experiencing disadvantage who cannot afford private legal services. Persistent unmet demand for CLCs is well‐documented. As artificial intelligence (AI) is increasingly used in private legal practice to
Catherine Hastings +2 more
wiley +1 more source
Modification of CAS-protocol for improvement of security web-applications from unauthorized access
Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data.
Alexey I Igorevich Alexandrov +1 more
doaj +1 more source
Reference to protection methods WI-FI network [PDF]
У роботі розглянуто методи захисту Wi-Fi мереж від несанкціонованого доступу, проаналізувати їхні переваги та недоліки.The paper considers methods of protecting Wi-Fi networks from unauthorized access, analyze their advantages and ...
Dunets, V. L. +3 more
core
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall +7 more
wiley +1 more source
Захист інформації від несанкціонованого доступу [PDF]
In this issue are considered shortcomings of the system information security and ways and methods of protecting information from unauthorized access. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789 ...
Kulish, Anatolii Mykolaiovych +3 more
core
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong +2 more
wiley +1 more source
Trust at the Edge: ABAC-Secured Federated Learning for Smart Home Access Control Using Blockchain
This paper proposes a novel security framework that integrates Attribute-Based Access Control (ABAC) with Federated Learning (FL) using Hyperledger Fabric smart contracts to secure IoT-based smart home environments.
Sohanur Rahman, Yi Wang, Bingyang Wei
doaj +1 more source

