|
|
|
Yinghui Zhao, Mengyuan Jiang, Jing Cheng and Congfeng Jiang
This paper analyzes the spatiotemporal changes and patterns of a regional water environment based on the hydrological and water quality monitoring times and the geographical locations of the monitoring sections in the research area, the plain of Cixi, ea...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jung-Ho Lewe
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le...
ver más
|
|
|
|
|
|
|
Dimitrios Kaklis, Ioannis Kontopoulos, Iraklis Varlamis, Ioannis Z. Emiris and Takis Varelas
Trajectory data holds pivotal importance in the shipping industry and transcend their significance in various domains, including transportation, health care, tourism, surveillance, and security. In the maritime domain, improved predictions for estimated ...
ver más
|
|
|
|
|
|
|
Zejuan Sun, Xiaoyi Wang, Xiaojuan Wang, Qingzhu Wang, Yang Liu, Bingyan Wang, Lin Guo and Xuexiang Chen
Abrupt climate events profoundly impact human societies, both environmentally and socially. However, existing research predominantly concentrates on immediate responses, overlooking long-term consequences. This study, centered on the Guojiazaoyuan site i...
ver más
|
|
|
|
|
|
|
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ...
ver más
|
|
|
|
|
|
|
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors...
ver más
|
|
|
|
|
|
|
Sakorn Mekruksavanich and Anuchit Jitpattanakul
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Iman I. M. Abu Sulayman, Peter Voege and Abdelkader Ouda
The increasing significance of data analytics in modern information analysis is underpinned by vast amounts of user data. However, it is only feasible to amass sufficient data for various tasks in specific data-gathering contexts that either have limited...
ver más
|
|
|
|
|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|