|
|
|
Junkai Yi and Xiaoyan Liu
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse...
ver más
|
|
|
|
|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
|
Minh Tran, Duc Pham-Hi and Marc Bui
In this paper, we propose a novel approach to optimize parameters for strategies in automated trading systems. Based on the framework of Reinforcement learning, our work includes the development of a learning environment, state representation, reward fun...
ver más
|
|
|
|
|
|
|
Bin Li, Caijie Yang and Zhongzhen Yang
In response to the evolving challenges of the integration and combination of multiple container terminal operations under berth water depth constraints, the multi-terminal dynamic and continuous berth allocation problem emerges as a critical issue. Based...
ver más
|
|
|
|
|
|
|
Jiacheng Hou, Tianhao Tao, Haoye Lu and Amiya Nayak
Information-centric networking (ICN) has gained significant attention due to its in-network caching and named-based routing capabilities. Caching plays a crucial role in managing the increasing network traffic and improving the content delivery efficienc...
ver más
|
|
|
|
|
|
|
Hangkun Xu and Runzi Liu
With the increase of the number of satellites in space, satellite tracking, telemetry, and command (TT&C) is becoming more and more important for aerospace. This paper proposes a method for a low time fragmentation oriented. TT&C task planning me...
ver más
|
|
|
|
|
|
|
Wenhao Ma and Hongzhen Xu
Cloud computing has experienced rapid growth in recent years and has become a critical computing paradigm. Combining multiple cloud services to satisfy complex user requirements has become a research hotspot in cloud computing. Service composition in mul...
ver más
|
|
|
|
|
|
|
Yuxin Zhao, Yanlong Liu and Xiong Deng
The observation path planning of an ocean mobile observation network is an important part of the ocean mobile observation system. With the aim of developing a traditional algorithm to solve the observation path of the mobile observation network, a comple...
ver más
|
|
|
|
|
|
|
Geng Chen, Xinzheng Mu, Fei Shen and Qingtian Zeng
With the explosive growth of network traffic and the diversification of service demands, network slicing (NS) and dual connectivity (DC) are considered as promising technologies in wireless networks. In this paper, we propose a novel algorithm that solve...
ver más
|
|
|
|
|
|
|
Jiabao Yu, Jiawei Chen, Ying Chen, Zhiguo Zhou and Junwei Duan
Although broad reinforcement learning (BRL) provides a more intelligent autonomous decision-making method for the collision avoidance problem of unmanned surface vehicles (USVs), the algorithm still has the problem of over-estimation and has difficulty c...
ver más
|
|
|
|