|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considere...
ver más
|
|
|
|
|
|
|
Michael Wood, Emanuele Ogliari, Alfredo Nespoli, Travis Simpkins and Sonia Leva
Optimal behind-the-meter energy management often requires a day-ahead electric load forecast capable of learning non-linear and non-stationary patterns, due to the spatial disaggregation of loads and concept drift associated with time-varying physics and...
ver más
|
|
|
|
|
|
|
Hongdan Liu, Yan Liu, Bing Li and Zhigang Qi
Ship abnormal behavior detection is an essential part of maritime supervision. It can assist maritime departments to conduct real-time supervision on a certain sea area, avoid ship risks, and improve the efficiency of sea area supervision. Given the prob...
ver más
|
|
|
|
|
|
|
Rong Wang, Zongzhi Gao, Qifeng Li, Chunjiang Zhao, Ronghua Gao, Hongming Zhang, Shuqin Li and Lu Feng
Natural breeding scenes have the characteristics of a large number of cows, complex lighting, and a complex background environment, which presents great difficulties for the detection of dairy cow estrus behavior. However, the existing research on cow es...
ver más
|
|
|
|
|
|
|
Francesca Calabrese, Alberto Regattieri, Raffaele Piscitelli, Marco Bortolini and Francesco Gabriele Galizia
Extracting representative feature sets from raw signals is crucial in Prognostics and Health Management (PHM) for components? behavior understanding. The literature proposes various methods, including signal processing in the time, frequency, and time?fr...
ver más
|
|
|
|
|
|
|
François Fouss and Elora Fernandes
Providing fair and convenient comparisons between recommendation algorithms?where algorithms could focus on a traditional dimension (accuracy) and/or less traditional ones (e.g., novelty, diversity, serendipity, etc.)?is a key challenge in the recent dev...
ver más
|
|
|
|
|
|
|
Zahra Tayebi, Sarwan Ali and Murray Patterson
The widespread availability of large amounts of genomic data on the SARS-CoV-2 virus, as a result of the COVID-19 pandemic, has created an opportunity for researchers to analyze the disease at a level of detail, unlike any virus before it. On the one han...
ver más
|
|
|
|
|
|
|
Limin Shen, Hui Li, Hongyi Wang, Yihuan Wang, Jiayin Feng and Yuqing Jian
On the Android platform, information leakage can use an application-layer privilege escalation attack composed of multi-app collusion. However, the detection effect of a single app that can construct privilege escalation attacks is not good. Furthermore,...
ver más
|
|
|
|