-
221
-
222
Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables
Published 2024-01-01“…The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content. Watermarking research still faces difficulties in striking a balance between speed, robustness, and imperceptibility. …”
Get full text
Article -
223
Forensic Video Analysis: Passive Tracking System for Automated Person of Interest (POI) Localization
Published 2018-01-01“…Video recorders record the output of each security camera. After an incident, the video footage can be used for evidence by locating a suspect or criminal for a crime. …”
Get full text
Article -
224
A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things
Published 2024-12-01“…The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process. …”
Get full text
Article -
225
A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence
Published 2025-07-01“…This research not only enhances detection capabilities but also bridges the trust gap in AI-powered security systems through transparency. The solution shows strong potential for application in critical domains such as finance, healthcare, industrial IoT, and government networks, where real-time and interpretable threat detection is vital.…”
Get full text
Article -
226
INFORMATION SYSTEM OF TESTING LABORATORY FOR RADIATION CONTROL
Published 2018-08-01Get full text
Article -
227
Utilising GIS-based spatial land resource analysis for subsidised fertiliser allocation in Jombang Regency, Indonesia
Published 2024-11-01“…Therefore, this study urges government stakeholders to implement the proposed method to maintain national food security in the country.…”
Get full text
Article -
228
Illegal Activities of Cartel Organizations in the Field of Public Procurement as a New Object of Statistical Study
Published 2024-05-01“…Only the fruitful joint work of law enforcement and control agencies will ensure the economic security of the state and protect the national interests of the Russian Federation.…”
Get full text
Article -
229
Spatial Position Reasoning of Image Entities Based on Location Words
Published 2024-12-01Get full text
Article -
230
Creativity in the education process of logistics students: a case study
Published 2024-12-01Get full text
Article -
231
Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques
Published 2025-08-01“…The exponential growth of internet usage and communication devices has led to heightened security vulnerabilities, including the proliferation of malware such as viruses, ransomware, trojans, and spyware. …”
Get full text
Article -
232
-
233
Salient object detection dataset with adversarial attacks for genetic programming and neural networksMendeley Data
Published 2024-12-01“…The dataset comprises 56,387 digital images, resulting from applying adversarial examples on subsets of four standard databases (i.e., FT, PASCAL-S, ImgSal, DUTS) and a fifth database (SNPL) portraying a real-world visual attention problem of a shorebird called the snowy plover. …”
Get full text
Article -
234
Backdoor Attack Based on Lossy Image Compression Using Discrete Cosine Transform
Published 2024-01-01“…The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a prerequisite for developing defense methods that enhance the security of DNNs. …”
Get full text
Article -
235
Universal share-based two-in-one multi-image secret sharing scheme by rotating random grids
Published 2025-03-01Get full text
Article -
236
-
237
Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives
Published 2025-04-01“…Extensive insights into IoT data security, privacy, and challenges are visualized in the context of data science for IoT. …”
Get full text
Article -
238
GRAPH MODELS OF THE DYNAMICS OF NETWORK ATTACKS IN AUTOMATED SYSTEMS OF INTERNAL AFFAIRS BODIES
Published 2021-04-01“…The most important task of the theory and practice of ensuring the information security of automated systems during their operation in a secure version at the objects of computerization of internal affairs bodies is to analyze the functioning process of systems for protecting confidential information resources from unauthorized access in case of network attacks, which involves modeling the process of their implementation and the development of graph models of the implementation dynamics of the main types of network attacks. …”
Get full text
Article -
239
Symmetric Grayscale Image Encryption Based on Quantum Operators with Dynamic Matrices
Published 2025-03-01“…Additionally, comparative tests against AES encryption demonstrate the advantages of our approach in terms of performance and security. The results show that the proposed method provides a high level of security while maintaining computational efficiency.…”
Get full text
Article -
240
Memes, freedom, and resilience to information disorders: Information warfare between democracies and autocracies
Published 2025-01-01“…The information challenges faced by liberal democracies in the post-truth era are largely related to the concept of freedom. While freedom and security are often positioned as dichotomous concepts, striking a delicate balance between them for democratic country becomes a challenge. …”
Get full text
Article