Showing 1,281 - 1,300 results of 9,720 for search '"security"', query time: 0.14s Refine Results
  1. 1281
  2. 1282
  3. 1283
  4. 1284
  5. 1285
  6. 1286
  7. 1287

    Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU

    Published 2020-10-01
    “…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
    Get full text
    Article
  8. 1288
  9. 1289
  10. 1290
  11. 1291
  12. 1292

    Brain activity patterns reflecting security perceptions of female cyclists in virtual reality experiments by Mohammad Arbabpour Bidgoli, Arian Behmanesh, Navid Khademi, Phromphat Thansirichaisree, Zuduo Zheng, Sara Saberi Moghadam Tehrani, Sajjad Mazloum, Sirisilp Kongsilp

    Published 2025-01-01
    “…Existing literature highlights that women’s willingness to use bicycles is significantly influenced by their perception of security. This study employs virtual reality (VR) cycling simulation and electroencephalography (EEG) analysis to investigate factors influencing female cyclists’ perceptions of security in Tehran. …”
    Get full text
    Article
  13. 1293

    CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism by Chongzhen Zhang, Hongye Sun, Zhaoyu Shen, Dongyu Wang

    Published 2024-12-01
    “…To address these challenges, this paper proposes a cross-zone secure federated learning method with blockchain and credibility mechanism, named CS-FL. …”
    Get full text
    Article
  14. 1294

    Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices by Andrea Baiocchi, Gianluca Maiolini, Annachiara Mingo, Daniele Goretti

    Published 2015-01-01
    “…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
    Get full text
    Article
  15. 1295
  16. 1296

    Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques by Muhammad Naufal Erza Farandi, Sri Winarno, Zahrah Asri Nur Fauzyah

    Published 2024-11-01
    “…This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. …”
    Get full text
    Article
  17. 1297

    An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks. by Nashmia Khalid, Sadaf Hina, Khurram Shabih Zaidi, Tarek Gaber, Lee Speakman, Zainab Noor

    Published 2025-01-01
    “…The practical implications of this research are crucial for the secure automation of wireless intrusion detection frameworks and tools in personal and enterprise paradigms.…”
    Get full text
    Article
  18. 1298
  19. 1299
  20. 1300

    Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control by Yang YANG, Bo-gang LIN, Mao-de MA

    Published 2013-08-01
    “…Moreover, the suggested system has the function to add and revoke user. Security analysis shows that the scheme could not only prevent the leakage of private data but also hide the information of keywords. …”
    Get full text
    Article