Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7481
Multi-feature fusion malware detection method based on attention and gating mechanisms
Published 2024-02-01“…With the rapid development of network technology, the number and variety of malware have been increasing, posing a significant challenge in the field of network security.However, existing single-feature malware detection methods have proven inadequate in representing sample information effectively.Moreover, multi-feature detection approaches also face limitations in feature fusion, resulting in an inability to learn and comprehend the complex relationships within and between features.These limitations ultimately lead to subpar detection results.To address these issues, a malware detection method called MFAGM was proposed, which focused on multimodal feature fusion.By processing the .asm and .bytes files of the dataset, three key features belonging to two types (opcode statistics sequences, API sequences, and grey-scale image features) were successfully extracted.This comprehensive characterization of sample information from multiple perspectives aimed to improve detection accuracy.In order to enhance the fusion of these multimodal features, a feature fusion module called SA-JGmu was designed.This module utilized the self-attention mechanism to capture internal dependencies between features.It also leveraged the gating mechanism to enhance interactivity among different features.Additionally, weight-jumping links were introduced to further optimize the representational capabilities of the model.Experimental results on the Microsoft malware classification challenge dataset demonstrate that MFAGM achieves higher accuracy and F1 scores compared to other methods in the task of malware detection.…”
Get full text
Article -
7482
„Religion and Ecology” – nowy paradygmat poznawczy
Published 2009-06-01“…It seems that without essential change of the live style we will not secure basic resources for the future generations. …”
Get full text
Article -
7483
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
7484
SPEED READING TO IMPROVE STUDENT’S READING SKILL
Published 2017-01-01“…The students’ reading skill of SMAN 2 Langsa in speed test is good. 1 students in experiment class secured A and no student obtained the same grade in control class. 9 students in experiment class got B while only 5 students from control class obtained the same score. …”
Get full text
Article -
7485
HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES
Published 2022-05-01“…The paper aimed at examining the impact of characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
Get full text
Article -
7486
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks
Published 2025-01-01“…Abstract The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. …”
Get full text
Article -
7487
Development of the blockchain curriculum system based on the PRIDE teaching mode
Published 2024-02-01“…In recent years, with the widespread attention received by its currency attributes from all sectors of society, blockchain technology has been rapidly developed.Being an emerging technology, blockchain technology possessed characteristics such as decentralization, immutability, and anonymity that found extensive applications in digital currency, supply chain management, electronic voting and other fields.In response to the government's call, universities across the country began offering blockchain courses.However, during the actual teaching process, common problems such as lack of educational resources and untimely curriculum updates were encountered.Many blockchain courses in universities remained at the theoretical level and lacked practical application and practice, resulting in poor learning effectiveness and difficulty in meeting societal needs.To address these problems, a blockchain curriculum construction scheme based on the PRIDE teaching model was proposed.This scheme combined the advantages of traditional teaching models with the characteristics of blockchain courses were combined, incorporating political teaching, research teaching, inspiration teaching, seminar teaching, and example teaching into blockchain courses.The aim was to improve students’ learning effectiveness and practical application abilities.Through years of teaching verification, it was proven that this scheme successfully resolved the issues existing in traditional blockchain courses and improved learning effectiveness and practical application abilities.Additionally, the scheme met the requirements for training cyberspace security talent, providing a strong talent guarantee for the development and application of blockchain technology in China while achieving significant teaching effects.…”
Get full text
Article -
7488
Digital Transformation and Performance Optimization at XYZ Higher Education through TOGAF-Based Enterprise Architecture
Published 2024-11-01“…It will help XYZ University achieve its digital transformation goals in the long term, leading to better coordination, more robust security, and higher operational efficiency.…”
Get full text
Article -
7489
Decline of post-neoliberal regionalism in South America: Weaknesses of “pink tide” political leadership on Defense policies
Published 2020-09-01“…Finally, evidence is provided that shows that domestic variables played a crucial role in accounting for the demise of this new regional security model. Structural internal weaknesses within the regional States also played a major part in limiting the capacity of political leaders to sustain their control over Defense policies. …”
Get full text
Article -
7490
Consumer Protection in TikTok Shop Sale Transactions Based on Law Number 8 of 1999
Published 2024-12-01“…The law provides fundamental rights for consumers, such as the right to security, accurate information, and compensation for non-conforming products. …”
Get full text
Article -
7491
The framing of the Belt and Road Initiative in Indo-Pakistani media
Published 2025-01-01“…The Daily Dawn frames were related to development, security challenges, and political concerns, while India sees China as a strong opponent and the BRI as China’s geostrategic plan to extend its global power and military presence in the Indian Ocean, posing a challenge to India’s national interests. …”
Get full text
Article -
7492
Dual Marginalisation and the Demand for Dual Citizenship: Negotiating “At Homeness” Among Diaspora Liberians
Published 2025-01-01“…Drawing on the “post‐exclusive turn” in citizenship (Harpaz & Mateos, 2019), which suggests that individuals often prioritize a premium passport over strong ties to a homeland, the article explores how diaspora Liberians pursue dual citizenship to secure a “true home” in Liberia. This advocacy is fueled by their marginalization both in Liberia, where they face scrutiny over their Liberianness, and in their host countries, where they experience otherness as ethnic minorities. …”
Get full text
Article -
7493
Vehicle Attribute Recognition for Normal Targets and Small Targets Based on Multitask Cascaded Network
Published 2019-01-01Get full text
Article -
7494
Analysing the manipulation of the youths, election violence and democratic retrogression in South Africa
Published 2025-01-01“…Rather than replicating the character of the youths of the 1970s who fought for better education and life as well as the freedom of the black population during the dark days of apartheid, some youths have taken to drugs, election violence while others have become personal security to top politicians owing to difficult economic hardship. …”
Get full text
Article -
7495
Commissariats of Military Industry during the Great Patriotic War
Published 2015-04-01“…The price of enormous effort of labor, research and design teams, huge material and financial costs in the course of the prewar five-year plans in the Soviet Union was paid and incurred to create the military-industrial complex (MIC) - sector of social production, designed to provide security for the state in armed struggle. The core of the DIC were four industry: Commissariat of Aviation Industry (NCAP), the People’s Commissariat of ammunition (NBC) weapons Commissariat (IEC) and the People's Commissariat of the shipbuilding industry (NCSP), formed in accordance with the Decree of the Presidium of the Supreme Soviet on January 11, 1939 by separation of the People's Commissariat of Defense Industry of the USSR. …”
Get full text
Article -
7496
Improving Quality Technological Education Using Web Systems Management Media
Published 2023-03-01“… The accompanying article manages the undertakings confronting the educator with current information and the arrangement of fundamental abilities, the conceivable outcomes of imaginative instructive advancements in their securing of new information, and the improvement of skill and individual characteristics. …”
Get full text
Article -
7497
Diplomatic power weaving of global systemic change: The European Union's steps
Published 2024-01-01“…The conflictual dynamics driven by the European Union and the United States of America competing with the People's Republic of China is undermining the possibility of mutuality as a new relational pattern to order the world safe for just humanity on a secure planet.…”
Get full text
Article -
7498
A Rare Case of Single-Rooted Mandibular Second Molar with Single Canal
Published 2020-01-01Get full text
Article -
7499
Assessment the Vulnerability of Infrastructures in Ardabil City in terms of passive defense
Published 2017-03-01“…At the moment with regard to geopolitical and geostrategic situation of Iran, the existence of countless underground resources and the formation of ideological state, unfortunately, in urban areas of the country, especially in Ardabil ,because of its proximity to the border of northern and northwestern borders with knowledge of this particular situation, economic and infrastructural projects, Infrastructures and installations have been made without observing and interference of considerations and defense and security arrangements and have become a bare and significant available target for enemy and invading countries. …”
Get full text
Article -
7500
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…We review state-of-the-art advancements involving INC and ICN, addressing critical topics such as service naming, executor selection strategies, compute reuse, and security. Furthermore, we discuss key challenges and propose research directions for deploying INC via ICN, thereby outlining a cohesive roadmap for future investigation.…”
Get full text
Article