|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
Guillaume Devic, Gilles Sassatelli and Abdoulaye Gamatié
The execution of machine learning (ML) algorithms on resource-constrained embedded systems is very challenging in edge computing. To address this issue, ML accelerators are among the most efficient solutions. They are the result of aggressive architectur...
ver más
|
|
|
|
|
|
Manuel Domínguez-Dorado, David Cortés-Polo, Javier Carmona-Murillo, Francisco J. Rodríguez-Pérez and Jesús Galeano-Brajones
This study holds direct applicability for organizations seeking to establish comprehensive, tactical, and operational cybersecurity management, especially within the CyberTOMP framework. In order to achieve this objective, the concerned organization will...
ver más
|
|
|
|
|
|
Xinzhi Liu, Jun Yu, Toru Kurihara, Congzhong Wu, Zhao Niu and Shu Zhan
It seems difficult to recognize an object from its background with similar color using conventional segmentation methods. An efficient way is to utilize hyperspectral images that contain more wave bands and richer information than only RGB components. Pa...
ver más
|
|
|
|
|
|
Tianlei Wang, Fei Ding and Zhenxing Sun
Human intelligence has the advantage for making high-level decisions in the remote control of underwater vehicles, while autonomous control is superior for accurate and fast close-range pose adjustment. Combining the advantages of both remote and autonom...
ver más
|
|
|