15   Artículos

 
en línea
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan    
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Junyi Cheng, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang and Peng Luo    
Early detection of people?s suspicious behaviors can aid in the prevention of crimes and make the community safer. Existing methods that are focused on identifying abnormal behaviors from video surveillance that are based on computer vision, which are mo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Yaseen Khan, Surendra Thakur, Obiseye Obiyemi and Emmanuel Adetiba    
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of so... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín    
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas    
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai    
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull    
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Elena Faccio and Lucrezia Guiotto Nai Fovino    
The food industry is constantly challenged to find new ideas to satisfy the increasingly specific consumer demand. However, innovative food products do not always become part of consumption habits or create a market. One of the major sources of resistanc... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon    
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don?t cooperate with... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim    
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »