Results 51 to 60 of about 37,859 (190)
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks
The rapid growth in the volume and importance of web communication throughout the Internet has heightened the need for better security protection. Security experts, when protecting systems, maintain a database featuring signatures of a large number of ...
Muhammad Hilmi Kamarudin +3 more
doaj +1 more source
A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems [PDF]
Pratishtha Shukla +3 more
openalex +1 more source
Exploring homogeneous dense groups is one of the important issues in social network structure measurement. k-core decomposition and core member filtering are common methods to uncover homogeneous dense groups in a network.
Zeyu Zhang +7 more
doaj +1 more source
ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION
Vladyslav Kyva
openalex +2 more sources
An interactive segmentation-based method for seismic facies annotation and segmentation
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian +5 more
doaj +1 more source
An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway [PDF]
Sule Yildirim Yayilgan +4 more
openalex +1 more source
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, and it has been proved that RNN works well in those areas.
Zheng Huang +4 more
doaj +1 more source
CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang +3 more
doaj +1 more source

