Littérature scientifique sur le sujet « Secure classification »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Secure classification ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Secure classification"
Pearson, Jane L., Deborah A. Cohn, Philip A. Cowan et Carolyn Pape Cowan. « Earned- and continuous-security in adult attachment : Relation to depressive symptomatology and parenting style ». Development and Psychopathology 6, no 2 (1994) : 359–73. http://dx.doi.org/10.1017/s0954579400004636.
Texte intégralHareesha, K. S., et M. Sumana. « Secure Two Party Privacy Preserving Classification Using Encryption ». International Journal of Information and Electronics Engineering 6, no 2 (2016) : 67–71. http://dx.doi.org/10.18178/ijiee.2016.6.2.597.
Texte intégralBaars, Thijs, et Marco Spruit. « Designing a Secure Cloud Architecture ». International Journal of Information Security and Privacy 6, no 1 (janvier 2012) : 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Texte intégralT., Tamanna, et Rajeev Kumar. « Secure Cloud Model using Classification and Cryptography ». International Journal of Computer Applications 159, no 6 (15 février 2017) : 8–13. http://dx.doi.org/10.5120/ijca2017912953.
Texte intégralUsharani, A. V., et Girija Attigeri. « Secure EMR Classification and Deduplication Using MapReduce ». IEEE Access 10 (2022) : 34404–14. http://dx.doi.org/10.1109/access.2022.3161439.
Texte intégralWiseman, Simon R. « Classification services in the SWORD secure DBMS ». Computers & ; Security 14, no 4 (janvier 1995) : 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.
Texte intégralSalehi, Mahmood, et Azzedine Boukerche. « Secure opportunistic routing protocols : methods, models, and classification ». Wireless Networks 25, no 2 (11 septembre 2017) : 559–71. http://dx.doi.org/10.1007/s11276-017-1575-1.
Texte intégral., S. Narayanan. « CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING ». International Journal of Research in Engineering and Technology 05, no 03 (25 mars 2016) : 159–66. http://dx.doi.org/10.15623/ijret.2016.0503034.
Texte intégralS L Swapna et V Saravanan. « Jaccard Index Cat Gradient Boosting Classification for Secured Big Data Communication ». Applied Science and Engineering Journal for Advanced Research 1, no 5 (30 septembre 2022) : 1–14. http://dx.doi.org/10.54741/asejar.1.5.1.
Texte intégralB, Murugeshwari, Jayakumar C et Sarukesi K. « Secure Multi Party Computation Technique for Classification Rule Sharing ». International Journal of Computer Applications 55, no 7 (20 octobre 2012) : 1–10. http://dx.doi.org/10.5120/8764-2683.
Texte intégralThèses sur le sujet "Secure classification"
Neubert, Janek. « Secure WebServer ». Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.
Texte intégralJaziri, Rakia. « Modèles de mélanges topologiques pour la classification de données structurées en séquences ». Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_jaziri.pdf.
Texte intégralRecent years have seen the development of data mining techniques in various application areas, with the purpose of analyzing sequential, large and complex data. In this work, the problem of clustering, visualization and structuring data is tackled by a three-stage proposal. The first proposal present a generative approach to learn a new probabilistic Self-Organizing Map (PrSOMS) for non independent and non identically distributed data sets. Our model defines a low dimensional manifold allowing friendly visualizations. To yield the topology preserving maps, our model exhibits the SOM like learning behavior with the advantages of probabilistic models. This new paradigm uses HMM (Hidden Markov Models) formalism and introduces relationships between the states. This allows us to take advantage of all the known classical views associated to topographic map. The second proposal concerns a hierarchical extension of the approach PrSOMS. This approach deals the complex aspect of the data in the classification process. We find that the resulting model ”H-PrSOMS” provides a good interpretability of classes built. The third proposal concerns an alternative approach statistical topological MGTM-TT, which is based on the same paradigm than HMM. It is a generative topographic modeling observation density mixtures, which is similar to a hierarchical extension of time GTM model. These proposals have then been applied to test data and real data from the INA (National Audiovisual Institute). This work is to provide a first step, a finer classification of audiovisual broadcast segments. In a second step, we sought to define a typology of the chaining of segments (multiple scattering of the same program, one of two inter-program) to provide statistically the characteristics of broadcast segments. The overall framework provides a tool for the classification and structuring of audiovisual programs
Zabel, Martin, Thomas B. Preußer, Peter Reichel et Rainer G. Spallek. « SHAP-Secure Hardware Agent Platform ». Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200701011.
Texte intégralBathe, Shivraj Gajanan. « Secure Communication in a Multi-OS-Environment ». Master's thesis, Universitätsbibliothek Chemnitz, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-196760.
Texte intégralPfennig, Stefan, et Elke Franz. « Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency ». Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Texte intégralFranz, Elke, Stefan Pfennig et André Fischer. « Communication Overhead of Network Coding Schemes Secure against Pollution Attacks ». Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-89807.
Texte intégralSleem, Lama. « Design and implementation of lightweight and secure cryptographic algorithms for embedded devices ». Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD018.
Texte intégralLiving in an era where new devices are astonishing considering their high capabilities, new visions and terms have emerged. Moving to smart phones, Wireless Sensor Networks, high-resolution cameras, pads and much more, has mandated the need to rethink the technological strategy that is used today. Starting from social media, where apparently everything is being exposed, moving to highly powerful surveillance cameras, in addition to real time health monitoring, it can be seen that a high amount of data is being stored in the Cloud and servers. This introduced a great challenge for their storage and transmission especially in the limited resourced platforms that are characterized by: (a) limited computing capabilities, (b) limited energy and source of power and (c) open infrastructures that transmit data over wireless unreliable networks. One of the extensively studied platforms is the Vehicular Ad-hoc Networks which tends to have many limitations concerning the security field. In this dissertation, we focus on improving the security of transmitted multimedia contents in different limited platforms, while preserving a high security level. Limitations of these platforms are taken into consideration while enhancing the execution time of the secure cipher. Additionally, if the proposed cipher is to be used for images, the intrinsic voluminous and complex nature of the managed images is also taken into account. In the first part, we surveyed one of the limited platforms that is interesting for many researchers, which is the Vehicular Ad-hoc Networks. In order to pave the way for researchers to find new efficient security solutions, it is important to have one reference that can sum most of the recent works. It almost investigates every aspect in this field shedding the light over different aspects this platform possesses. Then, in order to propose any new security solution and validate its robustness and the level of randomness of the ciphered image, a simple and efficient test is proposed. This test proposes using the randomness tools, TestU01 and Practrand, in order to assure a high level of randomness. After running these tests on well known ciphers, some flaws were exposed. Proceeding to the next part, a novel proposal for enhancing the well-known ultra lightweight cipher scheme, Speck, is proposed. The main contribution of this work is to obtain a better version compared to Speck. In this proposal, 26 rounds in Speck were reduced to 7 rounds in Speck-R while enhancing the execution time by at least 50%. First, we validate that Speck-R meets the randomness tests that are previously proposed. Additionally, a dynamic substitution layer adds more security against key related attacks and highly fortifies the cipher. Speck-R was implemented on different limited arduino chips and in all cases, Speck-R was ahead of Speck. Then, in order to prove that this cipher can be used for securing images, especially in VANETS/IoV, where images can be extensively re/transmitted, several tests were exerted and results showed that Speck-R indeed possesses the high level of security desired in any trusted cipher. Extensive experiments validate our proposal from both security and performance point of views and demonstrate the robustness of the proposed scheme against the most-known types of attacks
Pfennig, Stefan, et Elke Franz. « Secure Network Coding : Dependency of Efficiency on Network Topology ». Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128456.
Texte intégralHo, Zuleita K. M., et Eduard Jorswieck. « Secure degrees of freedom on widely linear instantaneous relay-assisted interference channel ». Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128420.
Texte intégralRiedel, Ursula, Frank Richter, Uwe Huebner, Jan Wunderlich, Holger Trapp, Matthias Clauss, Karsten Baensch et al. « Mitteilungen des URZ 1/2/1996 ». Universitätsbibliothek Chemnitz, 1996. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199600134.
Texte intégralLivres sur le sujet "Secure classification"
Documentos clasificados de la policía secreta de Carías (1937-1944). Tegucigalpa : Instituto Hondureño de Antropología e Historia, 2009.
Trouver le texte intégralBen-Israel, Isaac. Philosophie du renseignement : Logique et morale de l'espionnage. Paris : Éditions de l'éclat, 2004.
Trouver le texte intégralHarcourt, Edward, dir. Attachment and Character. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192898128.001.0001.
Texte intégralDe Baets, Antoon. Censorship and History since 1945. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199225996.003.0004.
Texte intégralChapitres de livres sur le sujet "Secure classification"
Bergström, Erik, et Rose-Mharie Åhlfeldt. « Information Classification Issues ». Dans Secure IT Systems, 27–41. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_2.
Texte intégralAktas, Kursat, et Sevil Sen. « UpDroid : Updated Android Malware and Its Familial Classification ». Dans Secure IT Systems, 352–68. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6_22.
Texte intégralAlishahi, Mina, Daan Gast et Sam Vermeiren. « Local Differential Privacy for Private Construction of Classification Algorithms ». Dans Secure IT Systems, 58–79. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22295-5_4.
Texte intégralMalik, Hafiz, Farhan Baqai, Ashfaq Khokhar et Rashid Ansari. « Secure Data-Hiding in Multimedia Using NMF ». Dans Multimedia Content Representation, Classification and Security, 265–72. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11848035_36.
Texte intégralSakib, Sadman, Mostafa M. Fouda et Zubair Md Fadlullah. « Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification ». Dans Secure Edge Computing, 137–53. Boca Raton : CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-11.
Texte intégralEl Bouny, Lahcen, Mohammed Khalil et Abdellah Adib. « ECG Beat Classification Based on Stationary Wavelet Transform ». Dans Mobile, Secure, and Programmable Networking, 110–23. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22885-9_11.
Texte intégralGabber, E., M. Jakobsson, Y. Matias et A. Mayer. « Curbing junk e-mail via secure classification ». Dans Financial Cryptography, 198–213. Berlin, Heidelberg : Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055484.
Texte intégralWang, Fen, Xiaoxuan Li, Xiaotao Huang et Ling Kang. « Improved Document Feature Selection with Categorical Parameter for Text Classification ». Dans Mobile, Secure, and Programmable Networking, 86–98. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50463-6_8.
Texte intégralReddy, B. Praeep Kumar, et Ayantika Chatterjee. « Encrypted Classification Using Secure K-Nearest Neighbour Computation ». Dans Security, Privacy, and Applied Cryptography Engineering, 176–94. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35869-3_13.
Texte intégralRiyad, Mouad, Mohammed Khalil et Abdellah Adib. « Cross-Subject EEG Signal Classification with Deep Neural Networks Applied to Motor Imagery ». Dans Mobile, Secure, and Programmable Networking, 124–39. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22885-9_12.
Texte intégralActes de conférences sur le sujet "Secure classification"
Gupta, Anand, Manik Singhal, Akash Gangil et Abhishek Mishra. « SDC : Secure deletion classification ». Dans 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2011. http://dx.doi.org/10.1109/icrtit.2011.5972299.
Texte intégralBerian, Alex, Kory Staab, Gregory Ditzler, Tamal Bose et Ravi Tandon. « Adversarial Filters for Secure Modulation Classification ». Dans 2021 55th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2021. http://dx.doi.org/10.1109/ieeeconf53345.2021.9723329.
Texte intégralFatayer, Tamer S., et Mohammed N. Azara. « IoT Secure Communication using ANN Classification Algorithms ». Dans 2019 International Conference on Promising Electronic Technologies (ICPET). IEEE, 2019. http://dx.doi.org/10.1109/icpet.2019.00033.
Texte intégralMaru, Siddharth, et Timothy X. Brown. « Packet classification in co-mingled traffic streams ». Dans 2009 5th IEEE Workshop on Secure Network Protocols (NPSec). IEEE, 2009. http://dx.doi.org/10.1109/npsec.2009.5342251.
Texte intégralLee, Shan-Hsin, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen et Shiuhpyng Shieh. « EC-Model : An Evolvable Malware Classification Model ». Dans 2021 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2021. http://dx.doi.org/10.1109/dsc49826.2021.9346248.
Texte intégralVaidya, Jaideep, et Bhakti Tulpule. « Enabling Better Medical Image Classification Through Secure Collaboration ». Dans 2007 IEEE International Conference on Image Processing. IEEE, 2007. http://dx.doi.org/10.1109/icip.2007.4380054.
Texte intégralYang, Ziqi. « Fidelity : Towards Measuring the Trustworthiness of Neural Network Classification ». Dans 2019 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc47296.2019.8937572.
Texte intégralPeixoto, Catarina, Hugo Peixoto, José Machado, António Abelha et Manuel F. Santos. « Iron Value Classification in Patients Undergoing Continuous Ambulatory Peritoneal Dialysis using Data Mining ». Dans Special Session on Healthy and Secure People. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006820802850290.
Texte intégralSharma, Seema, et Deepti Mehrotra. « Comparative Analysis of Multi-label Classification Algorithms ». Dans 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC). IEEE, 2018. http://dx.doi.org/10.1109/icsccc.2018.8703285.
Texte intégralArora, Mamta, Sanjeev Dhawan et Kulvinder Singh. « Deep Neural Network for Transformation Zone Classification ». Dans 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC). IEEE, 2018. http://dx.doi.org/10.1109/icsccc.2018.8703327.
Texte intégralRapports d'organisations sur le sujet "Secure classification"
Edwards, Mervyn, Matthias Seidl et Alix Edwards. GB LSAV Approval Scheme : Non-ADS requirements D7.1. TRL, juin 2022. http://dx.doi.org/10.58446/dxiy5599.
Texte intégral