88   Artículos

 
en línea
Feng Guo, Hongbing Ma, Liangliang Li, Ming Lv and Zhenhong Jia    
In the realm of maritime target detection, infrared imaging technology has become the predominant modality. Detecting infrared small ships on the sea surface is crucial for national defense and maritime security. However, the challenge of detecting infra... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Sharoug Alzaidy and Hamad Binsalleeh    
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing    
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuhang Zhang and Ming Ni    
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mengjing Gao, Tian Yan, Quancheng Li, Wenxing Fu and Jin Zhang    
As defense technology develops, it is essential to study the pursuit?evasion (PE) game problem in hypersonic vehicles, especially in the situation where a head-on scenario is created. Under a head-on situation, the hypersonic vehicle?s speed advantage is... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Jinze Du, Chengtai Gao and Tao Feng    
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li    
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yong Zhu, Qingyi Wu, Shengnan Tang, Boo Cheong Khoo and Zhengxi Chang    
As the modern industry rapidly advances toward digitalization, networking, and intelligence, intelligent fault diagnosis technology has become a necessary measure to ensure the safe and stable operation of mechanical equipment and effectively avoid major... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis    
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS... ver más
Revista: AI    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »