Search
Search Results
-
Reporting
An assessment is only as good as its report. The report is your final opportunity to communicate the value that your team produced for the client.... -
Operational Management
The execution of offensive cybersecurity projects requires a coordinated team, communication with the client, and a properly prepared project. Each... -
The Wedge
Your team has conducted a world-class assessment. They communicated with the client throughout the whole process, so the client is thoroughly aware... -
Application of Lattice-Based Unique Ring Signature in Blockchain Transactions
Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the... -
Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility
As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on... -
A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing
Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control.... -
An Image Copyright Authentication Model Based on Blockchain and Digital Watermark
To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional... -
Member Inference Attacks in Federated Contrastive Learning
In the past, the research community has studied privacy issues in federated learning, self-supervised learning, and deep models. However, privacy... -
Digital Watermarking: Pathway to Secure!
The progression in information technology has led to some thoughtful anxieties about the piracy and exclusive rights of digital content. The... -
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation
Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations.... -
Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection
Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of... -
Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning
The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for... -
A Graph-Based Vertical Federation Broad Learning System
A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and... -
EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme
Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing... -
Secured Digital Watermarking Using Neural Networks
Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the... -
Advances in Privacy Preservation Technologies
The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted... -
The Future Development Trends of Privacy Computing
We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy... -
Behavior-Based Detection Method for Android Malware
The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the... -
Menschen und andere Crown Jewels
Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –... -
Cyber Crisis Preparation
Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck...