106   Artículos

 
en línea
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma    
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection... ver más
Revista: Information    Formato: Electrónico

 
en línea
Leon Kopitar, Iztok Fister, Jr. and Gregor Stiglic    
Introduction: Type 2 diabetes mellitus is a major global health concern, but interpreting machine learning models for diagnosis remains challenging. This study investigates combining association rule mining with advanced natural language processing to im... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu    
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi    
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Marko Jevtic, Sa?a Mladenovic and Andrina Granic    
Due to the everchanging and evergrowing nature of programming technologies, the gap between the programming industry?s needs and the educational capabilities of both formal and informal educational environments has never been wider. However, the need to ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Martina Saletta and Claudio Ferretti    
Deep neural networks have proven to be able to learn rich internal representations, including for features that can also be used for different purposes than those the networks are originally developed for. In this paper, we are interested in exploring su... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zoltán Szabó and Vilmos Bilicki    
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alessandro Midolo and Emiliano Tramontana    
Sequential programs can benefit from parallel execution to improve their performance. When developing a parallel application, several techniques are employed to achieve the desired behavior: identifying parts that can run in parallel, synchronizing acces... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin    
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »