Search
Search Results
-
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation
Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations.... -
Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection
Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of... -
Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning
The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for... -
A Graph-Based Vertical Federation Broad Learning System
A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and... -
EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme
Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing... -
Secured Digital Watermarking Using Neural Networks
Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the... -
Behavior-Based Detection Method for Android Malware
The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the... -
Menschen und andere Crown Jewels
Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –... -
Cyber Crisis Preparation
Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck... -
Cyber Crisis (& Security) Grundlagen
Ob Bewältigung, Prävention oder Präparation: Sämtliche Phasen des Cyber Crisis Managements haben ein gemeinsamens Fundament. Dieses Fundament sind... -
Blockchain and Trustworthy Systems 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I
The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and... -
Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...
-
Physical Layer Security in Power Line Communications Fundamentals, Models and Applications
This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where...
-
Cyber Crisis Prevention
Wie bei allen Krisen kommt es auch bei Cyber-Krisen darauf an, inwieweit das Ereignis schon außerhalb der Organisation sichtbar ist. Faustregel: je... -
Post Crisis Care – Krisennachsorge und -nachbereitung
Im Kern geht es bei der Krisennachsorge und -nachbereitung um zwei Dinge: Wir müssen die Beziehungen zu unseren Stakeholdern wieder reparieren – das... -
Cyber Crisis Response
Ziel und Zweck der unmittelbaren Reaktion auf Cyber-Krisen ist, die (negativen) Auswirkungen eines adversen Ereignisses schnell und effizient... -
Internet of Things Overview: Architecture, Technologies, Application, and Challenges
The Internet of Things (IoT) links a wide range of heterogeneous things, where technology is integrated into everyday objects and connects these... -
Conclusion
This chapter concludes the book. Firstly, the book is summarised and some of the key points from each of the chapters are provided. The summary first... -
Continuous Authentication
This chapter introduces continuous biometric authentication. Initially the concept is introduced and the key components are discussed. The device... -
Introduction
The demand for user devices has grown rapidly in the last decade. This has been facilitated by technological advancements making devices cheaper,...