|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
Lisa Pierotti, Cristiano Fidani, Gianluca Facca and Fabrizio Gherardi
Variations in the CO2 dissolved in water springs have long been observed near the epicenters of moderate and strong earthquakes. In a recent work focused on data collected during the 2017?2021 period from a monitoring site in the Northern Apennines, Ital...
ver más
|
|
|
|
|
|
Jinghua Groppe, Sven Groppe, Daniel Senf and Ralf Möller
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent ways to...
ver más
|
|
|
|
|
|
Mahsa Kashani, Stefan Jespersen and Zhenyu Yang
The application of deoiling hydrocyclone systems as the downstream of three-phase gravity separator (TPGS) systems is one of the most commonly deployed produced water treatment processes in offshore oil and gas production. Due to the compact system?s com...
ver más
|
|
|
|
|
|
Dietlinde Köber, Felix Weber, Eugen Lozinca and Viorel Popa
Practical engineers should gain confidence in base isolation as an alternative to stiffening, a possible design approach for new as well as for existing buildings even under rare seismic conditions (in large corner period areas and for pulse-type seismic...
ver más
|
|
|