|
|
|
Ammar Odeh and Anas Abu Taleb
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten...
ver más
|
|
|
|
|
|
|
Fawaz Khaled Alarfaj and Jawad Abbas Khan
The online spread of fake news on various platforms has emerged as a significant concern, posing threats to public opinion, political stability, and the dissemination of reliable information. Researchers have turned to advanced technologies, including ma...
ver más
|
|
|
|
|
|
|
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan and Iznan H. Hasbullah
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 n...
ver más
|
|
|
|
|
|
|
Federico Corraro, Gianluca Corraro, Giovanni Cuciniello and Luca Garbarino
Collision Detection and Avoidance is one of the critical technologies for fully allowing Unmanned Aerial Systems to fly in civil airspaces. Current methods evaluate only potential conflicts with other aircraft using specific parameters (e.g., time or dis...
ver más
|
|
|
|
|
|
|
Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou and Theodore Zahariadis
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learni...
ver más
|
|
|
|
|
|
|
Timothy R. Seastedt and Meagan F. Oldfather
The populations, species, and communities in high elevation mountainous regions at or above tree line are being impacted by the changing climate. Mountain systems have been recognized as both resilient and extremely threatened by climate change, requirin...
ver más
|
|
|
|
|
|
|
María de Guadalupe Gaytán-Jiménez,Carlos López-Hernández
Pág. 25 - 34
How similar are the cases of ethical scandals of Barclays and Enron to those of Dionysius of Syracuse and Aristotle of Rhodes? What do the scandals of Firestone and Madoff have to do with Cleómenes of Alexandria and Mausolus of Caria? In the first case, ...
ver más
|
|
|
|
|
|
|
Gail Brooks, Alan Heffner, Dave Henderson
The analysis of data from social media sites can provide useful decision-making information for businesses; however, can small businesses with limited budgets and limited technical expertise compete in this new social media driven market? This study prov...
ver más
|
|
|
|
|
|
|
Kenn? N. de Kock, Cornelius T. Wolmarans, Mathilde Kemp, Wietsche Roets
Pág. 6 bladsye
Die bewaringstatus van minder as 2% van die ongeveer 7000 molluskspesies bekend w?reldwyd, is tot dusver behoorlik geassesseer. Gevolglik is die algemene vlak van bedreiging vir molluske power gedokumenteer en hoogs waarskynlik onderskat. Varswate...
ver más
|
|
|
|
|
|
|
Amanda Major, Janel Bell-Haynes, Eric Walton
The 21st century has seen the consequences of short-term leadership strategies, and the results have left little certainty, making long-term planning challenging. However, without a globally oriented, long-term, ethical strategy, some closed systems fail...
ver más
|
|
|
|