171   Artículos

 
en línea
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Alejandro Valencia-Arias, Juan David González-Ruiz, Lilian Verde Flores, Luis Vega-Mori, Paula Rodríguez-Correa and Gustavo Sánchez Santos    
Machine learning and blockchain technology are fast-developing fields with implications for multiple sectors. Both have attracted a lot of interest and show promise in security, IoT, 5G/6G networks, artificial intelligence, and more. However, challenges ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Baojun Cheng, Xiaowei Gu, Haoyue Hu, Yaning Kong and Pengyu Huang    
There are some limitations in the application of tuff powder as a supplementary cementitious material (SCM). Exploring its feasibility in new fields will consume a large amount of silica-alumina mine solid wastes. This study has investigated the mechanic... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Xianzheng Yu, Hua Liu, Xiaolin Fan, Liangyu Zhu, Chengqi Zhang and Shiyi Zhang    
In marine environments, bridge piers and columns are prone to corrosion caused by harmful media, particularly chloride ions. This corrosion can lead to cracking of the steel bars in the protective layer of the bridge piers. To enhance the corrosion resis... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay    
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Khalid Alnajim and Ahmed A. Abokifa    
In the wake of the terrorist attacks of 11 September 2001, extensive research efforts have been dedicated to the development of computational algorithms for identifying contamination sources in water distribution systems (WDSs). Previous studies have ext... ver más
Revista: Water    Formato: Electrónico

 
en línea
Chunggil Jung, Gayeong Lee and Jongyoon Park    
Anthropogenic development can strongly influence natural river processes, leading to environmental changes that negatively affect important habitats and biodiversity and consequently reduce economically important natural resources. This study investigate... ver más
Revista: Water    Formato: Electrónico

 
en línea
Xiaomei Fan, Tong Min and Xiaojie Dai    
Shallow groundwater in coastal aquifers is a highly dynamic and complex system with a high risk of seawater intrusion. Analyzing the spatio-temporal dynamic patterns of groundwater can help to manage the groundwater resource and prevent it from degradati... ver más
Revista: Water    Formato: Electrónico

 
en línea
Samuel Ndichu, Tao Ban, Takeshi Takahashi and Daisuke Inoue    
Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of false alerts issued by security appliances can prove to be a considerable hurdle. Machine learning algorithms can automate a task known as security alert data a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moody Alhanaya and Khalil Al-Shqeerat    
Internet of Things technology opens the horizon to a broader scope of intelligent applications in smart cities. However, the massive amount of traffic exchanged among devices may cause security risks, especially when devices are compromised or vulnerable... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 11     Siguiente »