Oussama Amine,Karim Baghery,Zaira Pindado et al.
Oussama Amine et al.
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are the most efficient proof systems in terms of proof size and verification. Currently, Groth's scheme from EUROCRYPT 2016, Groth 16 , is the state-of-the-art and ...
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling [0.03%]
基于非线性回归建模的新型混合饥饿游戏入侵检测系统算法
Shahriar Mohammadi,Mehdi Babagoli
Shahriar Mohammadi
Along with the advancement of online platforms and significant growth in Internet usage, various threats and cyber-attacks have been emerging and become more complicated and perilous in a day-by-day base. Anomaly-based intrusion detection s...
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience [0.03%]
民法下的公证服务的区块链与智能合约架构:巴西的经验
Leonardo Dias Menezes,Luciano Vieira de Araújo,Marislei Nishijima
Leonardo Dias Menezes
This paper proposes a blockchain solution for some activities currently performed by notary offices under the Civil Law judiciary that is technically viable. The architecture is also planned to accommodate Brazil's legal, political, and eco...
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system [0.03%]
分布式协作环境中的信任建模:在协作医疗系统中的应用
Rabie Barhoun,Maryam Ed-Daibouni
Rabie Barhoun
The issue of trust is a primary concern for individuals in distributed collaborative environments (DCEs), particularly in emergencies such as the COVID-19 pandemic. In these environments, collaboration and access to services are achieved th...
Aggeliki Tsohou,Vasiliki Diamantopoulou,Stefanos Gritzalis et al.
Aggeliki Tsohou et al.
Society has become increasingly dependent on IT infrastructure and services. Additionally, the pandemic of COVID-19 forced the transition of the traditional way of working (i.e., physical presence) into a more modern and flexible one (i.e.,...
Imdad Ullah,Roksana Boreli,Salil S Kanhere
Imdad Ullah
Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads, using an infrastructure of a number ...
Defense against membership inference attack in graph neural networks through graph perturbation [0.03%]
通过图扰动在图神经网络中防御成员推断攻击
Kai Wang,Jinxia Wu,Tianqing Zhu et al.
Kai Wang et al.
Graph neural networks have demonstrated remarkable performance in learning node or graph representations for various graph-related tasks. However, learning with graph data or its embedded representations may induce privacy issues when the n...
Swati,Sangita Roy,Jawar Singh et al.
Swati et al.
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current ...
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates [0.03%]
教育程度如何影响互联网安全知识、行为和态度:本科生、研究生和在职毕业生的比较
Qin An,Wilson Cheong Hin Hong,XiaoShu Xu et al.
Qin An et al.
During the pandemic, the prevailing online learning has brought tremendous benefits to the education field. However, it has also become a target for cybercriminals. Cybersecurity awareness (CSA) or Internet security awareness in the educati...
A review on fake news detection 3T's: typology, time of detection, taxonomies [0.03%]
假新闻检测的3T回顾:类型,检测时间和分类学
Shubhangi Rastogi,Divya Bansal
Shubhangi Rastogi
Fake news has become an industry on its own, where users paid to write fake news and create clickbait content to allure the audience. Apparently, the detection of fake news is a crucial problem and several studies have proposed machine-lear...