|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|
|
|
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid...
ver más
|
|
|
|
|
|
Dimitris C. Tsamatsoulis, Christos A. Korologos and Dimitris V. Tsiftsoglou
This study aims to approximate the optimum sulfate content of cement, applying maximization of compressive strength as a criterion for cement produced in industrial mills. The design includes tests on four types of cement containing up to three main comp...
ver más
|
|
|
|
|
|
Dominik Stallmann and Barbara Hammer
Novel neural network models that can handle complex tasks with fewer examples than before are being developed for a wide range of applications. In some fields, even the creation of a few labels is a laborious task and impractical, especially for data tha...
ver más
|
|
|
|
|
|
Sriniketan Sridhar, Anibal Romney and Vidya Manian
Mild Cognitive Impairment (MCI) and Alzheimer?s Disease (AD) are frequently associated with working memory (WM) dysfunction, which is also observed in various neural psychiatric disorders, including depression, schizophrenia, and ADHD. Early detection of...
ver más
|
|
|