|
|
|
Keundug Park and Heung-Youl Youm
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ...
ver más
|
|
|
|
|
|
|
Hermilo Santiago-Benito , Diana-Margarita Córdova-Esparza , Noé-Alejandro Castro-Sánchez , Teresa García-Ramirez , Julio-Alejandro Romero-González and Juan Terven
This paper introduces a novel method for collecting and translating texts from the Mixtec to the Spanish language. The method comprises four primary steps. First, we collected a Mixtec?Spanish corpus that includes 4568 sentences from educational and reli...
ver más
|
|
|
|
|
|
|
Kenneth David Strang
A critical worldwide problem is that ransomware cyberattacks can be costly to organizations. Moreover, accidental employee cybercrime risk can be challenging to prevent, even by leveraging advanced computer science techniques. This exploratory project us...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f...
ver más
|
|
|
|
|
|
|
Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu and Sutao Zhang
Traditional mechanical parts have been increasingly replaced by in-vehicle electronic control units (ECUs) that communicate via control area networks (CAN). For security reasons, the Database CAN (DBC) file, which defines the contents of CAN messages, is...
ver más
|
|
|
|
|
|
|
Nirmalya Thakur
Mining and analysis of the big data of Twitter conversations have been of significant interest to the scientific community in the fields of healthcare, epidemiology, big data, data science, computer science, and their related areas, as can be seen from s...
ver más
|
|
|
|
|
|
|
Abir Rahali and Moulay A. Akhloufi
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-malware software, as well as firewalls, require frequent updates and proactive implementation. However, processing the vast amounts of dataset examples can be overw...
ver más
|
|
|
|
|
|
|
Nirmalya Thakur
This paper presents multiple novel findings from a comprehensive analysis of a dataset comprising 1,244,051 Tweets about Long COVID, posted on Twitter between 25 May 2020 and 31 January 2023. First, the analysis shows that the average number of Tweets pe...
ver más
|
|
|
|
|
|
|
Paraskevas Koukaras, Dimitrios Rousidis and Christos Tjortjis
The identification and analysis of sentiment polarity in microblog data has drawn increased attention. Researchers and practitioners attempt to extract knowledge by evaluating public sentiment in response to global events. This study aimed to evaluate pu...
ver más
|
|
|
|
|
|
|
Jeffery T. H. Kong, Filbert H. Juwono, Ik Ying Ngu, I. Gde Dharma Nugraha, Yan Maraden and W. K. Wong
Social media has evolved into a platform for the dissemination of information, including fake news. There is a lot of false information about the current situation of the Coronavirus Disease 2019 (COVID-19) pandemic, such as false information regarding v...
ver más
|
|
|
|