Results 21 to 30 of about 111,415 (271)

RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
Allocating resources is crucial in large-scale distributed computing, as networks of computers tackle difficult optimization problems. Within the scope of this discussion, the objective of resource allocation is to achieve maximum overall computing ...
Moses Ashawa   +3 more
doaj   +1 more source

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

Attribution of Cyber Attacks on Industrial Control Systems [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2016
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on ...
Allan Cook   +4 more
doaj   +1 more source

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Memory access integrity: detecting fine-grained memory access errors in binary code

open access: yesCybersecurity, 2019
As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages like C/C++. Plenty of work have been proposed
Wenjie Li   +7 more
doaj   +1 more source

Longitudinal performance analysis of machine learning based Android malware detectors [PDF]

open access: yes, 2019
This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016.
Khan, Sarmadullah, Yerima, Suleiman
core   +1 more source

A comprehensive review of cyber-physical security risks in new power system

open access: yesSecurity and Safety
This review systematically examines the multifaceted cyber-physical security risks facing new power systems during the global energy transition, with a focus on three critical dimensions.
Huang Huihui   +4 more
doaj   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy