Results 1 to 10 of about 3,137,947 (294)
CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao +3 more
doaj +1 more source
Background Seasonal influenza places a substantial burden annually on healthcare services. Policies during the COVID-19 pandemic limited the transmission of seasonal influenza, making the timing and magnitude of a potential resurgence difficult to ...
Jonathon Mellor +7 more
doaj +1 more source
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun +3 more
doaj +1 more source
Deep neural network-aided design of terahertz bifunctional metasurface
Based on the insulator-to-metal phase transition of vanadium dioxide (VO2), we present a bifunctional metasurface (MS), which can be switched between the two working states, i.e., a broadband absorber and a broadband polarization converter.
Yisong Lv +5 more
doaj +1 more source
Existing approaches to sharing of distributed medical data either provide only limited protection of patients’ privacy or sacrifice the accuracy of results.
David Froelicher +8 more
doaj +1 more source
The acceleration of urbanization and the increasing demand for precise city planning have made the extraction of buildings and roads from remote sensing images crucial.
Ziyi Chen +5 more
doaj +1 more source
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad +1 more
doaj +1 more source
Dubhe: a deep-learning-based B5G coverage analysis method
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj
Uncovering the relationships between military community health and affects expressed in social media
Military populations present a small, unique community whose mental and physical health impacts the security of the nation. Recent literature has explored social media’s ability to enhance disease surveillance and characterize distinct communities with ...
Svitlana Volkova +3 more
doaj +1 more source

