نتایج جستجو برای: security sense

تعداد نتایج: 322501  

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2006
Karim Keshavjee Nick Pairaudeau Alisha Bhanji

Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated se...

1998
Ivan Krsul Eugene Spafford Tugkan Tuglular

The notion of Computer Policy is fundamental to the study of computer security models, the analysis of computer vulnerabilities, the development of intrusion detection tools, and the development of misuse detection tools. Security only makes sense in relation to security policies that specify what is being protected, how it must be protected, who has access to what is being protected, etc. Poli...

ژورنال: مسکن و محیط روستا 2021
Ahmadinejad, Fereshteh , Bandarabad, Alireza , Modiri, Atousa , Piri, Saeed ,

Tehran, the 200-year-old capital of Iran, is a young city with a complex political and social structure compared to many other cities in the country. Therefore, creating a sense of place and the formation of social relations in this metropolis has faced complexities, and the partisan and modernist view of urban planners has reduced the sense of belonging in the residents and, consequently, has ...

2014
V. Prasath R. Buvanesvari P. Nithin S. Banu K. Rajeswari

This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use pe...

Journal: :IACR Cryptology ePrint Archive 2011
Orr Dunkelman Nathan Keller Adi Shamir

In this paper we consider the following fundamental problem: What is the simplest possible construction of a block cipher which is provably secure in some formal sense? This problem motivated Even and Mansour to develop their scheme in 1991, but its exact security remained open for more than 20 years in the sense that the lower bound proof considered known plaintexts, whereas the best published...

2010
Michael Morran George R. S. Weir

Textual steganography is a means of concealing an encoded message within text. The appeal in such a system is its potential for hiding the fact that encoding is taking place. The failure to hide the presence of encoding is a form of information leakage and an inherent risk since it suggests that there is important or valuable information in transit. This is considered a major limitation of exis...

Journal: :IJESDF 2010
George R. S. Weir Michael Morran

Textual steganography is a means of concealing an encoded message within text. The appeal in such a system is its potential for hiding the fact that encoding is taking place. The failure to hide the presence of encoding is a form of information leakage and an inherent risk since it suggests that there is important or valuable information in transit. This is considered a major limitation of exis...

2015
Matthias Nickles Achim Rettinger

We propose a novel approach to the machine learning of formal word sense, learned in interaction with human users using a new form of Relational Reinforcement Learning. The envisaged main application area of our framework is humanmachine communication, where a software agent or robot needs to understand concepts used by human users (e.g., in Natural Language Processing, HCI or Information Retri...

2006
Maxim Mozgovoy Vitaly Tusov Vitaly Klyuev

Plagiarism detection systems are known for years in the university community. However, most of the existing detectors for the natural language texts use rather simple comparison methods that make the instances of plagiarism easy to hide. The software, designed for plagiarism detection in computer programs, utilizes far more advanced techniques. We propose a method, which adds functionalities si...

2008
Veronika Vincze György Szarvas Attila Almási Dóra Szauter Róbert Ormándi Richárd Farkas Csaba Hatvani János Csirik

To create the first Hungarian WSD corpus, 39 suitable word form samples were selected for the purpose of word sense disambiguation. Among others, selection criteria required the given word form to be frequent in Hungarian language usage (frequency rates available in the Hungarian National Corpus (HNC) were used for measurement (Váradi, 2000)), and to have more than one sense considered frequent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید