|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|
|
|
|
Norah Abanmi, Heba Kurdi and Mai Alzamel
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma...
ver más
|
|
|
|
|
|
|
Nguyen Duy Tan, Duy-Ngoc Nguyen, Hong-Nhat Hoang and Thi-Thu-Huong Le
The Internet of Things (IoT) integrates different advanced technologies in which a wireless sensor network (WSN) with many smart micro-sensor nodes is an important portion of building various IoT applications such as smart agriculture systems, smart heal...
ver más
|
|
|
|
|
|
|
Manfred Sneps-Sneppe
Pág. 115 - 125
The confrontation of these two technologies - packet-switching and circuit-switching ? has a long history, and it seems to be incessant. It had started with Asynchronous Transfer Mode technology in the 1990s. The breakup of the Bell System marked a key l...
ver más
|
|
|
|
|
|
|
Chia-Hao Chang
The main purpose of this article was to define a model that could defeat the online bookmakers? odds, where the betting item considered was the first five innings of major league baseball (MLB) matches. The betting odds of online bookmakers have two purp...
ver más
|
|
|
|
|
|
|
Ghazaleh Jamalipour Soufi, Ali Hekmatnia, Mahmoud Nasrollahzadeh, Nasrin Shafiei, Mohaddeseh Sajjadi, Parisa Iravani, Salman Fallah, Siavash Iravani and Rajender S. Varma
SARS-CoV-2 (COVID-19) has today multiplied globally and various governments are attempting to stop the outbreak of the disease escalation into a worldwide health crisis. At this juncture, readiness, candor, clarity, and partaking of data are of paramount...
ver más
|
|
|
|
|
|
|
Federico Corò, Gianlorenzo D?Angelo and Yllka Velaj
Political parties recently learned that they must use social media campaigns along with advertising on traditional media to defeat their opponents. Before the campaign starts, it is important for a political party to establish and ensure its media presen...
ver más
|
|
|
|
|
|
|
Seumas Miller
Recent revelations concerning data firm Cambridge Analytica?s illegitimate use of the data of millions of Facebook users highlights the ethical and, relatedly, legal issues arising from the use of machine learning techniques. Cambridge Analytica is, or w...
ver más
|
|
|
|
|
|
|
Dalal Hanna, Prakash Veeraraghavan and Ben Soh
Fingerprinting is a process of identifying the remote network devices and services running on the devices, including operating systems (OS) of the devices, and hosts running different OSs. Several research proposals and commercial products are available ...
ver más
|
|
|
|
|
|
|
Mamdouh Babi and Wenbing Zhao
Real-time collaborative editing applications are drastically different from typical client?server applications in that every participant has a copy of the shared document. In this type of environment, each participant acts as both a client and a server r...
ver más
|
|
|
|