|
|
|
Seung Oh Lee and Seung Ho Hong
Bridge pier scour is one of the main causes of bridge failure and a major factor that contributes to the total construction and maintenance costs of bridge. Recently, because of unexpected high water during extreme hydrologic events, the resilience and s...
ver más
|
|
|
|
|
|
|
Xi Duan, Jian Liu and Xinjie Wang
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla...
ver más
|
|
|
|
|
|
|
Fansheng Zhang, Lianglin Dong, Hongbo Wang, Ke Zhong, Peiyuan Zhang and Jinyan Jiang
During the construction of underground engineering, the prediction of groundwater distribution and rock body permeability is essential for evaluating the safety of the project and guiding subsequent design and construction. This article proposes an objec...
ver más
|
|
|
|
|
|
|
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c...
ver más
|
|
|
|
|
|
|
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur...
ver más
|
|
|
|
|
|
|
Walaa Elnashar, Hany F. Abd-Elhamid, Martina Zelenáková and Ahmed Elyamany
Excessive irrigating water that has not been adequately drained may cause more water to enter the crop root zone than is necessary. As a result, issues with increasing water table levels, waterlogging, and salinity get worse and cause crop productivity l...
ver más
|
|
|
|
|
|
|
Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz-López and Yury Niño Roa
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that inc...
ver más
|
|
|
|
|
|
|
An?e Mihelic, Toma? Hovelja and Simon Vrhovec
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f...
ver más
|
|
|
|
|
|
|
?arunas Grigaliunas, Michael Schmidt, Rasa Bruzgiene, Panayiota Smyrli and Vladislav Bidikov
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) ...
ver más
|
|
|
|