|
|
|
Flavia D. Frederick, Malvin S. Marlim and Doosun Kang
Chlorine decay over time and distance travelled poses challenges in maintaining consistent chlorine levels from treatment plants to demand nodes in water distribution networks (WDNs). Many studies have focused on optimizing chlorine booster systems and a...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
Antoine Picard, Florent Barbecot, Gérard Bardoux, Pierre Agrinier, Marina Gillon, José A. Corcho Alvarado, Vincent Schneider, Jean-François Hélie and Frédérick de Oliveira
Accurate discharge measurement is mandatory for any hydrological study. While the ?velocity? measurement method is adapted to laminar flows, the ?dilution? method is more appropriate for turbulent streams. As most low-gradient streams worldwide are neith...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly ou...
ver más
|
|
|
|
|
|
|
Frederick Gyasi and Tim Schlippe
French is a strategically and economically important language in the regions where the African language Twi is spoken. However, only a very small proportion of Twi speakers in Ghana speak French. The development of a Twi?French parallel corpus and corres...
ver más
|
|
|
|
|
|
|
Frederick Petry and Ronald Yager
This paper considers approaches to the computation of association rules for intuitionistic fuzzy data. Association rules can provide guidance for assessing the significant relationships that can be determined while analyzing data. The approach uses the c...
ver más
|
|
|
|
|
|
|
Ali V. Barenji, Benoit Montreuil, Sevda Babalou, Dima Nazzal, Frederick Benaben and Richard DeMillo
|
|
|
|