Hae
Aineistot 21-25 / 25
Data Reduction Methods of Audio Signals for Embedded Sound Event Recognition
(2020-06-23)
Sound event detection is a typical Internet of Things (IoT) application task, which could be used in many scenarios like dedicated security application, where cameras might be unsuitable due to the environment variations ...
Strong Customer Authentication : Security Issues and Solution Evaluation
(2020-06-10)
In October 2015 PSD2 first adopted by the European Parliament to initiate a new method of payment system. Since then, it receives several amendment time to time. Strong Customer Authentication (SCA), one of the major ...
A Study of Familiar Strangers in Temporal Interaction Networks
(2021-01-20)
There are rich and varied social ties between people in our daily lives. The familiar stranger is one of those social ties, and has attracted a lot of attention since the concept was proposed. Using knowledge of network ...
ANALYSIS OF BOTNET CLASSIFICATION AND DETECTION BASED ON C&C CHANNEL
(2018-11-22)
Botnet is a serious threat to cyber-security. Botnet is a robot that can enter the computer and perform DDoS attacks through attacker’s command. Botnets are designed to extract confidential information from network channels ...
Mathematics and Data Structures in Blockchain and Ethereum
(2018-12-12)
Blockchain is a technology to exchange digital assets including cryptocurrencies, data, software, patents etc. Blockchain is designed in various types depending on different architectures and configurations for different ...