Towards Optimal Sensor Placement for Cybersecurity: An Extensible Model for Defensive Cybersecurity Sensor Placement Evaluation. [PDF]
Wagner N, Damodaran SK, Reavey M.
europepmc +1 more source
AI-embedded IoT healthcare optimization with trust-aware mobile edge computing. [PDF]
Alamri M +3 more
europepmc +1 more source
Co-Registered Eye-Movements and Brain Potentials Reveal Multiple Effects of Context Across the Visual Field in Natural Reading. [PDF]
Copeland A, Payne BR.
europepmc +1 more source
Application of deep learning in behavior recognition and early warning system for campus safety management. [PDF]
Liu L.
europepmc +1 more source
Trends and anomalies in the coherence of the Southern Polar Vortex: A 26 year meta-study. [PDF]
Blachut C, Balasuriya S.
europepmc +1 more source
EGCN: Entropy-based graph convolutional network for anomalous pattern detection and forecasting in real estate markets. [PDF]
Le D +6 more
europepmc +1 more source
Spatiotemporal Anomaly Detection in Distributed Acoustic Sensing Using a GraphDiffusion Model. [PDF]
Jeong S +5 more
europepmc +1 more source
Data-Driven Early Warning Approach for Antimicrobial Resistance Prediction-Anomaly Detection Based on High-Level Indicators. [PDF]
Csorba S +6 more
europepmc +1 more source
Unusual Revelation of an Anomalous Right Coronary Artery: Non-ST Segment Elevation Myocardial Infarction (NSTEMI) in the Context of Drug Abuse. [PDF]
Kadrie AA, Black S, Balguri S, Cary C.
europepmc +1 more source
Context-aware temporal synthesis for scene, entity, and event inference from silent image. [PDF]
Rokaya M +3 more
europepmc +1 more source

