|
|
|
Min Hu, Fan Zhang and Huiming Wu
Various abnormal scenarios might occur during the shield tunneling process, which have an impact on construction efficiency and safety. Existing research on shield tunneling construction anomaly detection typically designs models based on the characteris...
ver más
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
Margarida Mendonça and Álvaro Figueira
As social media (SM) becomes increasingly prevalent, its impact on society is expected to grow accordingly. While SM has brought positive transformations, it has also amplified pre-existing issues such as misinformation, echo chambers, manipulation, and ...
ver más
|
|
|
|
|
|
George Papageorgiou, Vangelis Sarlis and Christos Tjortjis
This study utilized advanced data mining and machine learning to examine player injuries in the National Basketball Association (NBA) from 2000?01 to 2022?23. By analyzing a dataset of 2296 players, including sociodemographics, injury records, and financ...
ver más
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|