Intrusion Detection Method Based on Preprocessing of Highly Correlated and Imbalanced Data
This paper examines traditional machine learning algorithms, neural networks, and the benefits of utilizing ensemble models. Data preprocessing methods for improving the quality of classification models are considered.
Serhii Semenov +6 more
doaj +1 more source
On evaluating parallel computer systems [PDF]
A workshop was held in an attempt to program real problems on the MIT Static Data Flow Machine. Most of the architecture of the machine was specified but some parts were incomplete.
Adams, George B., III +2 more
core +1 more source
Special purpose computer provides programmable digital filter for sampled-data control systems [PDF]
Generalized digital filter is a special purpose computer. The term digital filter is an algorithm which accepts an input sequence of numbers and transforms it into an output number sequence.
Carroll, C. C.
core +1 more source
Metrics and methods in the evaluation of prestige bias in peer review: A case study in computer systems conferences. [PDF]
Frachtenberg E, McConville KS.
europepmc +1 more source
Implementation of two-factor user authentication in computer systems
Introduction/purpose: The paper explores the implementation of two-factor authentication (2FA) in computer systems, addressing the increasing need for enhanced security.
Mihailo D. Tomić, Olivera M. Radojević
doaj +1 more source
Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks. [PDF]
Kehagias D +3 more
europepmc +1 more source
Systems analysis of the space shuttle [PDF]
Developments in communications systems, computer systems, and power distribution systems for the space shuttle are described. The use of high speed delta modulation for bit rate compression in the transmission of television signals is discussed ...
Oh, S. J., Schilling, D. L., Thau, F.
core +1 more source
The modeling as a technique of categories for formation of system for research of characteristics of security of information processes in computer systems is considered. The structure to corresponding system of indicators of system of models on the basis
A. P. Kurilo +3 more
doaj
Human-machine diversity in the use of computerised advisory systems: a case study [PDF]
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the dependability of such systems.
Alberdi, E. +2 more
core
PASSWORD HASHING METHODS AND ALGORITHMS ON THE .NET PLATFORM
Web applications, which are widely used to provide services and collect information, have become a major target for attackers, especially with the emergence of government services that process sensitive data.
Volodymyr Fedorchenko +4 more
doaj +1 more source

