Zobrazeno 1 - 10
of 674
pro vyhledávání: '"IS security threat"'
Autor:
Toal, Gerard, author
Publikováno v:
Oceans Rise Empires Fall : Why Geopolitics Hastens Climate Catastrophe, 2024.
Externí odkaz:
https://doi.org/10.1093/oso/9780197693261.003.0005
Publikováno v:
Strategic Research on Social Problems, Vol 13, Iss 3, Pp 131-149 (2024)
Introduction In modern societies, political emotions and attitudes play a significant role in shaping individuals' political behaviors. Two critical factors—perceived threats and political corruption—exert both direct and indirect effects on citi
Externí odkaz:
https://doaj.org/article/f8c4d002cd3442eea01097858cdbb24a
Publikováno v:
Russian Journal of Economics and Law, Vol 18, Iss 2, Pp 535-553 (2024)
Objective: to review the results of the 7th Siberian Anti-Corruption Forum “Incentives and Restrictions in the System of Anticorruption Security” held in Krasnoyarsk on December 15-16, 2023 (organizers: Siberian Federal University, Krasnoyarsk Kr
Externí odkaz:
https://doaj.org/article/ab954bf9ca21475180abddfa3769ee4f
Publikováno v:
Российский технологический журнал, Vol 12, Iss 3, Pp 25-36 (2024)
Objectives. The currently increasing number of targeted cyberattacks raises the importance of investigating information security incidents. Depending on the available means of protection, computer forensic experts use software and hardware tools for
Externí odkaz:
https://doaj.org/article/72d335766bb045e3a8f3f5cce076b2b6
Publikováno v:
网络与信息安全学报, Vol 10, Pp 1-21 (2024)
Deep learning models are misled into making false predictions by adversarial attacks that implant tiny perturbations into the original input, which are imperceptible to the human eye. This poses a huge security threat to computer vision systems that
Externí odkaz:
https://doaj.org/article/d771c9c4660c49bca0e37e2e616f18e2
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 1-21 (2024)
Deep learning models are misled into making false predictions by adversarial attacks that implant tiny perturbations into the original input, which are imperceptible to the human eye. This poses a huge security threat to computer vision systems that
Externí odkaz:
https://doaj.org/article/149a3bce85bb4063a993d0524fdb43ca
Publikováno v:
Data in Brief, Vol 55, Iss , Pp 110663- (2024)
Sentiment analysis in the public security domain involves analysing public sentiment, emotions, opinions, and attitudes toward events, phenomena, and crises. However, the complexity of sarcasm, which tends to alter the intended meaning, combined with
Externí odkaz:
https://doaj.org/article/a04ee002ff134c26b60d65cd3c6414b1
Autor:
Zhu Lan
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-12 (2024)
Abstract With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex, which requires the use of a multi-layer feedforward neural network to build a security threat
Externí odkaz:
https://doaj.org/article/8ecdd625250945b99a6773edf952c805
Publikováno v:
Journal of Modern Science, Vol 51, Iss 2, Pp 141-173 (2023)
Objectives According to the authors, such an assumption requires describing the impact of information security management on the proper, efficient functioning of the organization in cyberspace. Increasingly, the concept of information is becoming a k
Externí odkaz:
https://doaj.org/article/50fd04193bc141e39b83c4e070096ca3
Autor:
Hu Zhifeng
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper constructs a detection technique for large-scale network security threats based on a knowledge graph, extracts the attack features of network security threats using feature template FT, and combines the CNN layer, BiLSTM layer and CRF laye
Externí odkaz:
https://doaj.org/article/39565c9841ee4675b2e8937223cc5a64