We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 101-120 of 1,866 results
  1. Secure Position-Aware Graph Neural Networks for Session-Based Recommendation

    Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations....
    Hongzhe Liu, Fengyin Li, Huayu Cheng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  2. Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection

    Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of...
    Conference paper 2024
  3. Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning

    The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for...
    **yun Jiang, Jia Yu, Luying Min in Artificial Intelligence Security and Privacy
    Conference paper 2024
  4. A Graph-Based Vertical Federation Broad Learning System

    A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and...
    Junrong Ge, Fengyin Li, ... Liangna Sun in Artificial Intelligence Security and Privacy
    Conference paper 2024
  5. EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme

    Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing...
    Wendan Zhang, Yuhong Sun, ... Chen Zhang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  6. Secured Digital Watermarking Using Neural Networks

    Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the...
    Purba Pal, Sharmila Ghosh, ... Joy Lal Sarkar in Multimedia Watermarking
    Chapter 2024
  7. Behavior-Based Detection Method for Android Malware

    The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the...
    Weina Niu, **aosong Zhang, ... Jiacheng Gong in Android Malware Detection and Adversarial Methods
    Chapter 2024
  8. Menschen und andere Crown Jewels

    Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  9. Cyber Crisis Preparation

    Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  10. Cyber Crisis (& Security) Grundlagen

    Ob Bewältigung, Prävention oder Präparation: Sämtliche Phasen des Cyber Crisis Managements haben ein gemeinsamens Fundament. Dieses Fundament sind...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  11. Blockchain and Trustworthy Systems 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I

    ​The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and...
    Jiachi Chen, Bin Wen, Ting Chen in Communications in Computer and Information Science
    Conference proceedings 2024
  12. Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II

    This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...

    Jaideep Vaidya, Moncef Gabbouj, ** Li in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Physical Layer Security in Power Line Communications Fundamentals, Models and Applications

    This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where...

    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Advances in Information Security
    Book 2024
  14. Cyber Crisis Prevention

    Wie bei allen Krisen kommt es auch bei Cyber-Krisen darauf an, inwieweit das Ereignis schon außerhalb der Organisation sichtbar ist. Faustregel: je...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  15. Post Crisis Care – Krisennachsorge und -nachbereitung

    Im Kern geht es bei der Krisennachsorge und -nachbereitung um zwei Dinge: Wir müssen die Beziehungen zu unseren Stakeholdern wieder reparieren – das...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  16. Cyber Crisis Response

    Ziel und Zweck der unmittelbaren Reaktion auf Cyber-Krisen ist, die (negativen) Auswirkungen eines adversen Ereignisses schnell und effizient...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  17. Internet of Things Overview: Architecture, Technologies, Application, and Challenges

    The Internet of Things (IoT) links a wide range of heterogeneous things, where technology is integrated into everyday objects and connects these...
    Maroua Ahmid, Okba Kazar, Ezedin Barka in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  18. Conclusion

    This chapter concludes the book. Firstly, the book is summarised and some of the key points from each of the chapters are provided. The summary first...
    Chapter 2024
  19. Continuous Authentication

    This chapter introduces continuous biometric authentication. Initially the concept is introduced and the key components are discussed. The device...
    Chapter 2024
  20. Introduction

    The demand for user devices has grown rapidly in the last decade. This has been facilitated by technological advancements making devices cheaper,...
    Chapter 2024
Did you find what you were looking for? Share feedback.