Showing 221 - 240 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 221
  2. 222

    Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables by Yasmin Alaa Hassan, Abdul Monem S. Rahma

    Published 2024-01-01
    “…The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content. Watermarking research still faces difficulties in striking a balance between speed, robustness, and imperceptibility. …”
    Get full text
    Article
  3. 223

    Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization by Aftab Khan, Sakhi Rehman, Muhammad Waleed, Ashfaq Khan, Umair Khan, Tariq Kamal, Shehryar Khan Afridi, Safdar Nawaz Khan Marwat

    Published 2018-01-01
    “…Video recorders record the output of each security camera. After an incident, the video footage can be used for evidence by locating a suspect or criminal for a crime. …”
    Get full text
    Article
  4. 224

    A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things by S. Thalapathiraj, J. Arunnehru, V. C. Bharathi, R. Dhanasekar, L. Vijayaraja, R. Kannadasan, Muhammad Faheem, Arfat Ahmad Khan

    Published 2024-12-01
    “…The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process. …”
    Get full text
    Article
  5. 225

    A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence by Abdullah Alabdulatif

    Published 2025-07-01
    “…This research not only enhances detection capabilities but also bridges the trust gap in AI-powered security systems through transparency. The solution shows strong potential for application in critical domains such as finance, healthcare, industrial IoT, and government networks, where real-time and interpretable threat detection is vital.…”
    Get full text
    Article
  6. 226
  7. 227

    Utilising GIS-based spatial land resource analysis for subsidised fertiliser allocation in Jombang Regency, Indonesia by Chendy Tafakresnanto, Antonius Kasno, Zuziana Susanti, Elna Karmawati, Setyono Hari Adi, Muhamad Hidayanto, Suratman Suratman, Achmad Arivin Rivaie

    Published 2024-11-01
    “…Therefore, this study urges government stakeholders to implement the proposed method to maintain national food security in the country.…”
    Get full text
    Article
  8. 228

    Illegal Activities of Cartel Organizations in the Field of Public Procurement as a New Object of Statistical Study by A. E. Lyapin

    Published 2024-05-01
    “…Only the fruitful joint work of law enforcement and control agencies will ensure the economic security of the state and protect the national interests of the Russian Federation.…”
    Get full text
    Article
  9. 229
  10. 230
  11. 231

    Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques by Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh

    Published 2025-08-01
    “…The exponential growth of internet usage and communication devices has led to heightened security vulnerabilities, including the proliferation of malware such as viruses, ransomware, trojans, and spyware. …”
    Get full text
    Article
  12. 232
  13. 233

    Salient object detection dataset with adversarial attacks for genetic programming and neural networksMendeley Data by Matthieu Olague, Gustavo Olague, Roberto Pineda, Gerardo Ibarra-Vazquez

    Published 2024-12-01
    “…The dataset comprises 56,387 digital images, resulting from applying adversarial examples on subsets of four standard databases (i.e., FT, PASCAL-S, ImgSal, DUTS) and a fifth database (SNPL) portraying a real-world visual attention problem of a shorebird called the snowy plover. …”
    Get full text
    Article
  14. 234

    Backdoor Attack Based on Lossy Image Compression Using Discrete Cosine Transform by Yuting Liu, Hong Gu, Annan Zhang, Pan Qin

    Published 2024-01-01
    “…The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a prerequisite for developing defense methods that enhance the security of DNNs. …”
    Get full text
    Article
  15. 235
  16. 236
  17. 237

    Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives by Inam Ullah, Deepak Adhikari, Xin Su, Francesco Palmieri, Celimuge Wu, Chang Choi

    Published 2025-04-01
    “…Extensive insights into IoT data security, privacy, and challenges are visualized in the context of data science for IoT. …”
    Get full text
    Article
  18. 238

    GRAPH MODELS OF THE DYNAMICS OF NETWORK ATTACKS IN AUTOMATED SYSTEMS OF INTERNAL AFFAIRS BODIES by E. S. Ovchinnikova

    Published 2021-04-01
    “…The most important task of the theory and practice of ensuring the information security of automated systems during their operation in a secure version at the objects of computerization of internal affairs bodies is to analyze the functioning process of systems for protecting confidential information resources from unauthorized access in case of network attacks, which involves modeling the process of their implementation and the development of graph models of the implementation dynamics of the main types of network attacks. …”
    Get full text
    Article
  19. 239

    Symmetric Grayscale Image Encryption Based on Quantum Operators with Dynamic Matrices by Luis Olvera-Martinez, Manuel Cedillo-Hernandez, Carlos Adolfo Diaz-Rodriguez, Leonardo Faustinos-Morales, Antonio Cedillo-Hernandez, Francisco Javier Garcia-Ugalde

    Published 2025-03-01
    “…Additionally, comparative tests against AES encryption demonstrate the advantages of our approach in terms of performance and security. The results show that the proposed method provides a high level of security while maintaining computational efficiency.…”
    Get full text
    Article
  20. 240

    Memes, freedom, and resilience to information disorders: Information warfare between democracies and autocracies by Anton Liagusha, Dmytro Iarovyi

    Published 2025-01-01
    “…The information challenges faced by liberal democracies in the post-truth era are largely related to the concept of freedom. While freedom and security are often positioned as dichotomous concepts, striking a delicate balance between them for democratic country becomes a challenge. …”
    Get full text
    Article