نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :The ANNALS of the American Academy of Political and Social Science 2009

Journal: :Lecture Notes in Computer Science 2022

AbstractWe study protecting a user’s data (images in this work) against learner’s unauthorized use training neural networks. It is especially challenging when the only tiny percentage of complete set. We revisit traditional watermarking under modern deep learning settings to tackle challenge. show that user watermarks images using specialized linear color transformation, network classifier will...

Journal: :Journal of Sensor and Actuator Networks 2023

The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring processing sensitive data. Attackers have exploited this prospect IoT devices to compromise user data’s integrity confidentiality. Considering the dynamic nature attacks, artificial intelligence (AI)-based techniques incorporating machine learning ...

Journal: :Management Science 2021

Unauthorized subcontracting—when suppliers outsource part of their production to a third party without the retailer’s consent—has been common practice in apparel industry and is often tied noncompliant working conditions. Because retailers are unaware party, process becomes obscure cannot be tracked. In this paper, we present an empirical study factors that can lead engage unauthorized subcontr...

2002
Shigeyuki Matsuda Tatsuya Baba Akihiro Hayakawa Taichi Nakamura

We had proposed a hop-by-hop IP traceback method that can reliably trace a source of an attack. In this paper, we describe the development and the evaluation of our prototype system. The main features of our proposed method are the packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet, and the algorithm using datalink...

Journal: :Ad Hoc Networks 2007
Nikos Komninos Dimitris Vergados Christos Douligeris

Security of mobile ad-hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are no...

Journal: :CoRR 2017
Yair Meidan Michael Bohadana Asaf Shabtai Martín Ochoa Nils Ole Tippenhauer Juan David Guarnizo Yuval Elovici

Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید