DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 628
31.
  • No evidence of attentional ... No evidence of attentional prioritization for threatening targets in visual search
    Zsido, Andras N; Hout, Michael C; Hernandez, Marko ... Scientific reports, 03/2024, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Throughout human evolutionary history, snakes have been associated with danger and threat. Research has shown that snakes are prioritized by our attentional system, despite many of us rarely ...
Celotno besedilo
Dostopno za: UL
32.
  • Towards asynchronous federa... Towards asynchronous federated learning based threat detection: A DC-Adam approach
    Tian, Pu; Chen, Zheyi; Yu, Wei ... Computers & security, September 2021, 2021-09-00, 20210901, Letnik: 108
    Journal Article
    Recenzirano
    Odprti dostop

    The increasing popularity and widespread use of Internet of Things (IoT) and Cyber-Physical Systems (CPS) technologies have produced a significant need for the integration of cloud and edge computing ...
Celotno besedilo
Dostopno za: UL
33.
  • Continuous auditing and thr... Continuous auditing and threat detection in multi-cloud infrastructure
    Torkura, K.A.; Sukmana, Muhammad I.H.; Cheng, Feng ... Computers & security, March 2021, 2021-03-00, 20210301, Letnik: 102
    Journal Article
    Recenzirano
    Odprti dostop

    Efficient change control and configuration management is imperative for addressing the emerging security threats in cloud infrastructure. These threats majorly exploit misconfiguration ...
Celotno besedilo
Dostopno za: UL

PDF
34.
  • Inexperienced preys know wh... Inexperienced preys know when to flee or to freeze in front of a threat
    Hébert, Marie; Versace, Elisabetta; Vallortigara, Giorgio Proceedings of the National Academy of Sciences - PNAS, 11/2019, Letnik: 116, Številka: 46
    Journal Article
    Recenzirano
    Odprti dostop

    Using appropriate antipredatory responses is crucial for survival. While slowing down reduces the chances of being detected from distant predators, fleeing away is advantageous in front of an ...
Celotno besedilo
Dostopno za: UL

PDF
35.
  • An Insider Data Leakage Det... An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
    Al-Shehari, Taher; Alsowail, Rakan A Entropy (Basel, Switzerland), 09/2021, Letnik: 23, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public ...
Celotno besedilo
Dostopno za: UL

PDF
36.
  • Detection of explosive mate... Detection of explosive materials in dual-energy X-Ray security systems
    Yalçın, Ozan; Reyhancan, İskender Atilla Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment, 10/2022, Letnik: 1040
    Journal Article
    Recenzirano

    Due to the increasing security needs, X-ray devices have started to be used more and more in security systems. Dual-energy X-ray devices are preferred to conventional ones since they enable Effective ...
Celotno besedilo
Dostopno za: UL
37.
  • A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023
    Journal Article
    Recenzirano

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Celotno besedilo
Dostopno za: UL
38.
  • Both fearful and happy expr... Both fearful and happy expressions interact with gaze direction by 200 ms SOA to speed attention orienting
    McCrackin, Sarah D.; Itier, Roxane J. Visual cognition, 04/2018, Letnik: 26, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Attention orienting towards a gazed-at location is fundamental to social attention. Whether gaze cues can interact with emotional expressions other than those signalling environmental threat to ...
Celotno besedilo
Dostopno za: UL

PDF
39.
  • Semi-Supervised Cyber Threa... Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach
    Ebrahimi, Mohammadreza; Nunamaker, Jay F.; Chen, Hsinchun Journal of management information systems, 07/2020, Letnik: 37, Številka: 3
    Journal Article
    Recenzirano

    Dark Net Marketplaces (DNMs), online selling platforms on the dark web, constitute a major component of the underground economy. Due to the anonymity and increasing accessibility of these platforms, ...
Celotno besedilo
Dostopno za: UL
40.
  • DNS Rebinding Threat Modeli... DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems
    He, Xudong; Wang, Jian; Liu, Jiqiang ... IEEE transactions on intelligent transportation systems, 02/2023, Letnik: 24, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Maritime ships and ports have become increasingly digital and intelligent. While intelligent maritime transportation systems bring convenience to the maritime industry, ship operation and management ...
Celotno besedilo
Dostopno za: UL
2 3 4 5 6
zadetkov: 628

Nalaganje filtrov