|
|
|
Violeta Migallón and José Penadés
Graph theory is a common topic that is introduced as part of the curricula of computing courses such as Computer Science, Computer Engineering, Data Science, Information Technology and Software Engineering. Understanding graphs is fundamental for solving...
ver más
|
|
|
|
|
|
Qun Wang, Yufei Gao, Tingting Gong, Tiejun Liu, Zhengwei Sui, Jinghui Fan and Zhenyu Wang
The Xiaolangdi Dam is a key project for the control and development of the Yellow River. It bears the functions of flood control, controlling water and sediment in the lower reaches, ice prevention, industrial and agricultural water supply, power generat...
ver más
|
|
|
|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
Areej Alabduljabbar and Sultan Alyahya
Crowdsourced software engineering (CSE) is an emerging area that has been gaining much attention in the last few years. It refers to the use of crowdsourcing techniques in software engineering activities, including requirements engineering, implementatio...
ver más
|
|
|
|
|
|
Yang Li, Yongjie Wang, Xinli Xiong, Jingye Zhang and Qian Yao
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research hotspo...
ver más
|
|
|