Showing 281 - 300 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 281
  2. 282

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  3. 283

    Secure Pesticide Storage: Facility Size and Location by Thomas W. Dean

    Published 2004-10-01
    “… This document identifies and answers two basic questions that typically arise when planning to build a secure pesticide storage facility. This document is Fact Sheet PI-29, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  4. 284
  5. 285
  6. 286

    Refugee Protection and Food Security in Kampala, Uganda by Andrea Brown

    Published 2025-01-01
    Subjects: “…refugees, urban food security, self-settlement, Kampala, Uganda…”
    Get full text
    Article
  7. 287

    ANALYSIS OF GRID-SYSTEMS INFORMATION SECURITY ASPECTS by A. I. Trubei

    Published 2016-10-01
    “…The article presents the analysis of Grid-systems information security aspects, Also, risk assessment methods, using public databases, expert systems and statistical techniques are proposed.…”
    Get full text
    Article
  8. 288
  9. 289
  10. 290
  11. 291

    Research on Telecommunication System Business Security Architecture by Hong Li, Kai Qu

    Published 2013-08-01
    Subjects: “…telecom system business security…”
    Get full text
    Article
  12. 292

    SIM: a secure IP protocol for MANET by Rong-sen LI, Wen-hua DOU

    Published 2013-08-01
    Subjects: “…secure IP protocol for manet…”
    Get full text
    Article
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298
  19. 299

    Western Experience in Strategic Planning for National Security by V. P. Nazarov

    Published 2019-11-01
    “…The purpose of this article is to provide an overview of the best Western practices in strategic planning with the view to improve the effectiveness of the Russian Federation national security policy in the face of new challenges and threats.Having analyzed Western approaches to ensuring national security, the article concludes that the political and governance practice needs to include more of strategic planning elements, such as strategic forecasting, monitoring, and national security assessment. …”
    Get full text
    Article
  20. 300

    A survey of security threats in federated learning by Yunhao Feng, Yanming Guo, Yinjian Hou, Yulun Wu, Mingrui Lao, Tianyuan Yu, Gang Liu

    Published 2025-01-01
    “…We also sort out the relationship between these methods, their advantages and disadvantages, and discuss future research directions regarding the security issues of federated learning from multiple perspectives.…”
    Get full text
    Article