|
|
|
Davy Preuveneers and Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m...
ver más
|
|
|
|
|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Khalid Alnajim and Ahmed A. Abokifa
In the wake of the terrorist attacks of 11 September 2001, extensive research efforts have been dedicated to the development of computational algorithms for identifying contamination sources in water distribution systems (WDSs). Previous studies have ext...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth...
ver más
|
|
|
|
|
|
|
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co...
ver más
|
|
|
|
|
|
|
Tao Feng, Chengfan Liu, Xiang Gong and Ye Lu
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency. However, with the increasing interconnection of sys...
ver más
|
|
|
|
|
|
|
Qianwen Zhou, Changqing Zhu and Na Ren
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ...
ver más
|
|
|
|
|
|
|
Li Yu, Liuquan Xu and Xuefeng Jiang
The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types of attacks, the need for innovative approach...
ver más
|
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Analyzing the condition and function of the heart is very important because cardiovascular diseases (CVDs) are responsible for high mortality rates worldwide and can lead to strokes and heart attacks; thus, early diagnosis and treatment are important. Ph...
ver más
|
|
|
|
|
|
|
Enyang Mei and Kunyang Yu
The combination of water management and urban planning can promote the sustainable development of cities, which can be achieved through buildings? absorption and utilization of pollutants in water. Sulfate ions are one of the important pollutants in wate...
ver más
|
|
|
|