25   Artículos

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information    Formato: Electrónico

 
en línea
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche    
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considere... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Michael Wood, Emanuele Ogliari, Alfredo Nespoli, Travis Simpkins and Sonia Leva    
Optimal behind-the-meter energy management often requires a day-ahead electric load forecast capable of learning non-linear and non-stationary patterns, due to the spatial disaggregation of loads and concept drift associated with time-varying physics and... ver más
Revista: Forecasting    Formato: Electrónico

 
en línea
Hongdan Liu, Yan Liu, Bing Li and Zhigang Qi    
Ship abnormal behavior detection is an essential part of maritime supervision. It can assist maritime departments to conduct real-time supervision on a certain sea area, avoid ship risks, and improve the efficiency of sea area supervision. Given the prob... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Rong Wang, Zongzhi Gao, Qifeng Li, Chunjiang Zhao, Ronghua Gao, Hongming Zhang, Shuqin Li and Lu Feng    
Natural breeding scenes have the characteristics of a large number of cows, complex lighting, and a complex background environment, which presents great difficulties for the detection of dairy cow estrus behavior. However, the existing research on cow es... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Francesca Calabrese, Alberto Regattieri, Raffaele Piscitelli, Marco Bortolini and Francesco Gabriele Galizia    
Extracting representative feature sets from raw signals is crucial in Prognostics and Health Management (PHM) for components? behavior understanding. The literature proposes various methods, including signal processing in the time, frequency, and time?fr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
François Fouss and Elora Fernandes    
Providing fair and convenient comparisons between recommendation algorithms?where algorithms could focus on a traditional dimension (accuracy) and/or less traditional ones (e.g., novelty, diversity, serendipity, etc.)?is a key challenge in the recent dev... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zahra Tayebi, Sarwan Ali and Murray Patterson    
The widespread availability of large amounts of genomic data on the SARS-CoV-2 virus, as a result of the COVID-19 pandemic, has created an opportunity for researchers to analyze the disease at a level of detail, unlike any virus before it. On the one han... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Limin Shen, Hui Li, Hongyi Wang, Yihuan Wang, Jiayin Feng and Yuqing Jian    
On the Android platform, information leakage can use an application-layer privilege escalation attack composed of multi-app collusion. However, the detection effect of a single app that can construct privilege escalation attacks is not good. Furthermore,... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »