|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
F. Necati Catbas, Jacob Anthony Cano, Furkan Luleci, Lori C. Walters and Robert Michlowitz
This study investigates the capture of digital data and the development of models for structures with incomplete documentation and plans. LiDAR technology is utilized to obtain the point clouds of a pedestrian bridge structure. Two different point clouds...
ver más
|
|
|
|
|
|
|
Herve M. Kabamba, Matthew Khouzam and Michel R. Dagenais
Tracing serves as a key method for evaluating the performance of microservices-based architectures, which are renowned for their scalability, resource efficiency, and high availability. Despite their advantages, these architectures often pose unique debu...
ver más
|
|
|
|
|
|
|
Heidi Toivonen and Francesco Lelli
This paper investigates how users of smart devices attribute agency both to themselves and to their devices. Statistical analyses, tag cloud analysis, and sentiment analysis were applied on survey data collected from 587 participants. As a result of a pr...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Mizuki Asano, Takumi Miyoshi and Taku Yamazaki
Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devices ...
ver más
|
|
|
|
|
|
|
Weihong Ma, Xiangyu Qi, Yi Sun, Ronghua Gao, Luyu Ding, Rong Wang, Cheng Peng, Jun Zhang, Jianwei Wu, Zhankang Xu, Mingyu Li, Hongyan Zhao, Shudong Huang and Qifeng Li
Acquiring phenotypic data from livestock constitutes a crucial yet cumbersome phase in the breeding process. Traditionally, obtaining livestock phenotypic data primarily involves manual, on-body measurement methods. This approach not only requires extens...
ver más
|
|
|
|
|
|
|
Moon-Il Joo, Dong-Yoon Kang, Min-Soo Kang and Hee-Cheol Kim
Edge computing can provide core functions such as data collection and analysis without connecting to a centralized server. The convergence of edge computing and IoT devices has enabled medical institutions to collect patient data in real time, improving ...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|