We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm

    A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...

    Randy Kuang, Maria Perepechaenko, ... Michel Barbeau in EURASIP Journal on Information Security
    Article Open access 09 July 2024
  2. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  3. Errorless robust JPEG steganography using steganographic polar codes

    Recently, a robust steganographic algorithm that achieves errorless robustness against JPEG recompression has been proposed. The method employs a...

    Jimin Zhang, **aolei He, Yun Cao in EURASIP Journal on Information Security
    Article Open access 04 July 2024
  4. Mining digital identity insights: patent analysis using NLP

    The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide....

    Matthew Comb, Andrew Martin in EURASIP Journal on Information Security
    Article Open access 03 July 2024
  5. The risk of negative feedback loops in some weighted measures of crime harm

    Analyses of crime based upon aggregate counts of different crime types have restricted value, because they count all crime types equally irrespective...

    Sam Lewis, Jose Pina-Sánchez, Daniel Birks in Crime Science
    Article Open access 27 June 2024
  6. Technology is key to green coal mining

    Greening of coal through sustainable mining in India requires extensive deployment of technology. This article briefly highlights the role of...

    Rajiv Shekhar, Sheo Shankar Rai in CSI Transactions on ICT
    Article 25 June 2024
  7. Multi-view Heterogeneous Graph Neural Networks for Node Classification

    Recently, with graph neural networks (GNNs) becoming a powerful technique for graph representation, many excellent GNN-based models have been...

    ** Zeng, Fang-Yuan Lei, ... Qing-Yun Dai in Data Science and Engineering
    Article Open access 24 June 2024
  8. Graph-Enhanced Prompt Learning for Personalized Review Generation

    Personalized review generation is significant for e-commerce applications, such as providing explainable recommendation and assisting the composition...

    **aoru Qu, Yifan Wang, ... Jun Gao in Data Science and Engineering
    Article Open access 18 June 2024
  9. The fight against disinformation and its consequences: measuring the impact of “Russia state-affiliated media” on Twitter

    On February 28th, shortly after the Russian invasion of Ukraine on February 24th, Twitter announced the expansion of its labelling policy for “Russia...

    Jesús C. Aguerri, Mario Santisteban, Fernando Miró-Llinares in Crime Science
    Article Open access 15 June 2024
  10. Channel-Enhanced Contrastive Cross-Domain Sequential Recommendation

    Sequential recommendation help users find interesting items by modeling the dynamic user-item interaction sequences. Due to the data sparseness...

    Liu Yufang, Wang Shaoqing, ... Sun Fuzhen in Data Science and Engineering
    Article Open access 14 June 2024
  11. Conti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning

    Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has...

    Estelle Ruellan, Masarah Paquet-Clouston, Sebastián Garcia in Crime Science
    Article Open access 12 June 2024
  12. Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization

    The introduction of blockchain technology has brought about significant transformation in the realm of digital transactions, providing a secure and...

    Buti Sello, Jianming Yong, **aohui Tao in Data Science and Engineering
    Article Open access 06 June 2024
  13. Understanding the impact of urban heat islands on crime: insights from temperature, population density, and green canopy cover

    Emergent literature suggests that micro- and macro-climates influence criminal behaviour; a complex phenomenon that is still incipient in theory...

    Emil E. Jonescu, Chamil Erik Ramanayaka, ... Talia J. Uylaki in Crime Science
    Article Open access 06 June 2024
  14. Positive behaviour interventions in online gaming: a systematic review of strategies applied in other environments

    Background

    Disruptive behaviours are a recurrent concern in online gaming and are usually dealt with through reactive and punitive strategies....

    Tiago Garrido Marques, Sandy Schumann, Enrico Mariconti in Crime Science
    Article Open access 30 May 2024
  15. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

    The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to...

    Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, ... Shankar Karuppayah in EURASIP Journal on Information Security
    Article Open access 27 May 2024
  16. AutoDetect: Novel Autoencoding Architecture for Counterfeit IC Detection

    The global electronic supply chain industry is a complex and interconnected network of companies, organizations, and individuals that collaborate to...

    Chaitanya Bhure, Geraldine Shirley Nicholas, ... Fareena Saqib in Journal of Hardware and Systems Security
    Article Open access 23 May 2024
  17. Contribution to the harm assessment of darknet markets: topic modelling drug reviews on Dark0de Reborn

    Amid the global opioid crisis, the volume of drug trade via darknet markets has risen to an all-time high. The steady increase can be explained by...

    Ákos Szigeti, Richard Frank, Tibor Kiss in Crime Science
    Article Open access 21 May 2024
  18. Exploring police attitudes on victims’ delayed reporting and victim blame in technology-facilitated IPV

    Background setting

    Cyberstalking, now conceptualised as one of the forms of technology-facilitated intimate partner violence (TFIPV), has seen an...

    Stavros Chatzisymeonidis, Afroditi Pina in Crime Science
    Article Open access 21 May 2024
  19. ViSE: Digital Twin Exploration for Automotive Functional Safety and Cybersecurity

    The automotive industry relies on modern automobile systems, which are complex distributed embedded systems. These systems consist of numerous...

    Md Rafiul Kabir, Sandip Ray in Journal of Hardware and Systems Security
    Article 17 May 2024
  20. An empirical assessment of seaports as facilitators of FOC-flagged transshipment landings

    Transshipment is one of the most common activities occurring between carriers and fishing vessels to exchange fish, as well as fuel, crew, and gear...

    Gohar A. Petrossian, Stephen F. Pires, ... Noah D. Cohen in Crime Science
    Article Open access 14 May 2024
Did you find what you were looking for? Share feedback.