Results 1 to 10 of about 489,634 (291)

Ontological model for predicting cyberattacks based on virtualized Honeynets

open access: yesLogos Ciencia & Tecnología, 2016
The honeynets security tools are widely used today for the purpose of gathering information from potential attackers about vulnerabilities in our network. For performing correct use of them is necessary to understand the existing types, structures raised,
Gaona-García, Pablo   +2 more
doaj   +1 more source

A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models

open access: yesApplied Sciences
In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes of information.
Monserrat Vázquez-Hernández   +5 more
doaj   +1 more source

Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)

open access: yesIraqi Journal for Computer Science and Mathematics
Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. Better confidence in and image of the company in the cybersecurity space, faster solving issues,
Yasmin Makki Mohialden   +2 more
doaj   +1 more source

Atrial vulnerability

open access: yesClinical Cardiology, 1992
The electrophysiologic substrates of atrial flutter and fibrillation (AFF) have been studied in patients with paroxysmal arrhythmias. Atrial repetitive responses to extrastimuli are a nonspecific response, even though they can precipitate AFF. AFF inducibility is rather sensitive, but not very specific, in separating patients from controls. There is no
openaire   +2 more sources

Romanian Labour Market – Vulnerable persons and vulnerabilities [PDF]

open access: yesRevista Română de Statistică, 2011
Romanian economy’s transition process began suddenly and was accompanied by disintegration of former political and economic system. In terms of GDP per capita, Romania has been one of the poorest countries in Central and Eastern Europe.
Daniela TODOSE   +2 more
doaj  

PASTA-4-PHT: a pipeline for automated security and technical audits for the personal health train. [PDF]

open access: yesBMC Med Inform Decis Mak
Welten S   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy