-
61
Less-Conventional Low-Consumption Galvanic Separated MOSFET-IGBT Gate Drive Supply
Published 2017-01-01“…The supply is made while hacking a common mode type filter as a transformer, as the transformer shows a good insulation, it has a very low parasitic capacitance between primary and secondary coils, and it is cost-effective. …”
Get full text
Article -
62
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01“…The security loopholes and quantum hacking schemes of practical system were analyzed. …”
Get full text
Article -
63
Impact of Social Media on Marriage Stability in Central Division Kabale Municipality Kabale District.
Published 2025“…The study findings indicated that Hacking is identified by 21.2% of respondents as a significant challenge associated with social media use. …”
Get full text
Thesis -
64
L’adultère à l’ère numérique : Une discussion sur la non/monogamie et le développement des technologies numériques à partir du cas Ashley Madison
Published 2017-06-01“…The interview addresses these transformations in relation to the adultery industry and interrogates practices of surveillance, hacking and privacy in the digital context. It also addresses the effects of these developments on human lives.…”
Get full text
Article -
65
Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection
Published 2015-06-01“…The system can locate on the entrance line of the video website and broadcasting network,run independently and stand guard its entryway to ensure that no illegal video can be send into the network even though the sending systems be hacked. Moreover,the system can locate on carrying network line and provide solutions for supervision of video fragmentation under multiple-screen fusion situation and copyright protection on transmit line in real time.…”
Get full text
Article -
66
Postcards from Inside the Practices
Published 2025-02-01“…ENRIQUE ESPINOSA PÉREZ Domestic Mediations: Tricks, Hacks, Memes, and Mattress Exchanges as Minor Architectures This multimodal article reflects on the insufficient consideration of (architectural) design as an ‘object-centered discipline’. …”
Get full text
Article -
67
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01“…Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. …”
Get full text
Article -
68
Laguna de fracasos
Published 2024-12-01“…We inhabit the irony of a virtuality that imposes a distance on us and at the same time it hacks all geographical borders. A practice that does not yet have a name, a performance that is always provisional, weaving voices and actions through listening and activating our own and other people’s writings. …”
Get full text
Article -
69
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01“…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. …”
Get full text
Article -
70
National Allegory in Teju Cole’s Open City
Published 2024-06-01“…This stance is facilitated by its portrayal of the protagonist Julius as suffering not a dissociative fugue but a dissociative amnesia, which I arrive at by using the American Psychiatric Association’s Diagnostic and Statistical Manual (DSM) V and a rereading of Ian Hacking to revise prior interpretations of Julius as flâneur-fugueur. …”
Get full text
Article -
71
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article -
72
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. …”
Get full text
Article -
73
Shifting lines in D. H. Lawrence’s travel writings
Published 2024-12-01“…In Mornings in Mexico, for example, he makes the startling assertion that “the straight course is hacked out in wounds, against the will of the world”. …”
Get full text
Article -
74
Developing an Intelligent System for Efficient Botnet Detection in IoT Environment
Published 2025-04-01“…In order to achieve proper detection of hacks in the future, relevant datasets must be used. …”
Get full text
Article -
75
TBAS: Token-based authorization service architecture in Internet of things scenarios
Published 2017-07-01“…Furthermore, the token is valid only within a period of time or it will not work after the token count exceeds the threshold defined by the system, thereby lowering the devices’ risk of being hacked. The framework proposed in this article is applied to medical wearable devices. …”
Get full text
Article -
76
-
77
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01“…However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)‐based systems have gained significant popularity recently. …”
Get full text
Article -
78
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. …”
Get full text
Article -
79
A Comprehensive Review on Limitations of Autonomous Driving and Its Impact on Accidents and Collisions
Published 2024-01-01“…It delves into prevalent limitations faced by self-driving cars, encompassing issues like adverse weather conditions, susceptibility to hacking, data security concerns, technological efficacy, testing and validation intricacies, information handling, and connectivity glitches. …”
Get full text
Article -
80
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…These include the traditionally troublesome Denial of Service (DoS) attacks, key management weaknesses, and the mentioned novel threats. We discuss the hacking techniques, tools, and associated risks to the IDS framework, followed by targeted mitigation strategies and recommendations. …”
Get full text
Article