|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|
|
|
|
Jonas Blattgerste, Jan Behrends and Thies Pfeiffer
Mobile Augmented Reality (AR) is a promising technology for educational purposes. It allows for interactive, engaging, and spatially independent learning. While the didactic benefits of AR have been well studied in recent years and commodity smartphones ...
ver más
|
|
|
|
|
|
|
Polina Lemenkova
Automated classification of satellite images is a challenging task that enables the use of remote sensing data for environmental modeling of Earth?s landscapes. In this document, we implement a GRASS GIS-based framework for discriminating land cover type...
ver más
|
|
|
|
|
|
|
Najah Mary El-Gharib and Daniel Amyot
Process mining (PM) exploits event logs to obtain meaningful information about the processes that produced them. As the number of applications developed on cloud infrastructures is increasing, it becomes important to study and discover their underlying p...
ver más
|
|
|
|
|
|
|
Polina Lemenkova
This paper explores spatial variability of the ten climatic variables of Mongolia in 2019: average minimal and maximal temperatures, wind speed, soil moisture, downward surface shortwave radiation (DSRAD), snow water equivalent (SWE), vapor pressure defi...
ver más
|
|
|
|
|
|
|
Polina Lemenkova
This articles presents a new series of maps showing the climate and environmental variability of Botswana. Situated in southern Africa, Botswana has an arid to semi-arid climate, which significantly varies in its different regions: Kalahari Desert, Makga...
ver más
|
|
|
|
|
|
|
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ...
ver más
|
|
|
|
|
|
|
?.?. Yudova,Olga R. Laponina
Pág. 61 - 68
This article is devoted to the analysis of the possibility of detecting attacks on web applications using machine learning algorithms. Supervised learning is considered. A sample of HTTP DATASET CSIC 2010 is used as a data set. The dataset was automatica...
ver más
|
|
|
|
|
|
|
Pascal Pieper, Vladimir Herdt and Rolf Drechsler
RISC-V is a modern Instruction Set Architecture (ISA) that, by its open nature in combination with a clean and modular design, has enormous potential to become a game changer in the Internet of Things (IoT) era. Recently, SystemC-based Virtual Prototypes...
ver más
|
|
|
|
|
|
|
Carlo Cravero, Davide De Domenico and Andrea Ottonello
One of the main issues addressed in any engineering design problem is to predict the performance of the component or system as accurately and realistically as possible, taking into account the variability of operating conditions or the uncertainty on inp...
ver más
|
|
|
|