|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
Aldo Fiori, Irene Pomarico, Antonio Zarlenga, Vittorio Catani and Guido Leone
This work extends the overlay and index methods for intrinsic groundwater vulnerability, that typically involve the soil surface and the vadose zone, to groundwater (saturated) transport. The method is ?hybrid? as it combines the standard overlay and ind...
ver más
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl...
ver más
|
|
|
|
|
|
Piero Colajanni, Lidia La Mendola, Alessia Monaco and Salvatore Pagnotta
Seismic-resilient buildings are increasingly designed following low-damage and free-from-damage design strategies that aim to protect the structure?s primary load-bearing systems under ultimate-level seismic loads. With this scope, damping devices are lo...
ver más
|
|
|