|
|
|
Weining Zhang, Minghua Hu, Jianan Yin, Haobin Li and Jinghan Du
Airspace sectorization is a powerful means to balance the increasing air traffic flow and limited airspace resources, which is related to the efficiency and safety of operations. In order to divide sectors reasonably, a multi-objective optimization frame...
ver más
|
|
|
|
|
|
Paraskevas Koukaras, Dimitrios Rousidis and Christos Tjortjis
The identification and analysis of sentiment polarity in microblog data has drawn increased attention. Researchers and practitioners attempt to extract knowledge by evaluating public sentiment in response to global events. This study aimed to evaluate pu...
ver más
|
|
|
|
|
|
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec...
ver más
|
|
|
|
|
|
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an...
ver más
|
|
|
|
|
|
Almetwally M. Mostafa, Alaa Altheneyan, Abeer Alnuaim and Aseel Alhadlaq
A computer system generates logs to record all relevant operational data about the system and all operations performed in such systems. System log examination is crucial in the identification of network- and system-level assaults. In comparison to establ...
ver más
|
|
|