|
|
|
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co...
ver más
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
Domenico Pascarella, Gabriella Gigante, Angela Vozella, Maurizio Sodano, Marco Ippolito, Pierre Bieber, Thomas Dubot and Edgar Martinavarro
The drone market?s growth poses a serious threat to the negligent, illicit, or non-cooperative use of drones, especially in airports and their surroundings. Effective protection of an airport against drone intrusions should guarantee mandatory safety lev...
ver más
|
|
|
|
|
|
Shao-Ming Lee and Ja-Ling Wu
Recently, federated learning (FL) has gradually become an important research topic in machine learning and information theory. FL emphasizes that clients jointly engage in solving learning tasks. In addition to data security issues, fundamental challenge...
ver más
|
|
|
|
|
|
Yuancheng Li and Yongtai Qin
In today?s business environment, reducing costs is crucial due to the variety of Internet of Things (IoT) devices and security infrastructure. However, applying security measures to complex business scenarios can lead to performance degradation, making i...
ver más
|
|
|