Results 11 to 20 of about 1,717,630 (292)

Cyber situational awareness: from geographical alerts to high-level management [PDF]

open access: yes, 2016
This paper focuses on cyber situational awareness and describes a visual analytics solution for monitoring and putting in tight relation data from network level with the organization business.
Angelini, Marco, Santucci, Giuseppe
core   +1 more source

Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree

open access: yesMathematics, 2022
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li   +6 more
doaj   +1 more source

Research on the Link Prediction Model of Dynamic Multiplex Social Network Based on Improved Graph Representation Learning

open access: yesIEEE Access, 2021
In the natural and social systems of the real world, various network can be seen everywhere. The world where people live can be seen as a combination of network with different dimensions. Link prediction formalizes the interaction behavior between people.
Tianyu Xia, Yijun Gu, Dechun Yin
doaj   +1 more source

IoT Equipment Monitoring System Based on C5.0 Decision Tree and Time-Series Analysis

open access: yesIEEE Access, 2022
Abnormal traffic and vulnerability attack monitoring play an important role in today’s Internet of Things (IoT) applications. The existing solutions are usually based on machine learning for traffic, and its disadvantage is that a large number of ...
Biaokai Zhu   +8 more
doaj   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

open access: yesSensors, 2023
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng   +3 more
doaj   +1 more source

Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]

open access: yes, 2009
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core   +1 more source

New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding [PDF]

open access: yes, 2012
The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes.
Kurihara, Jun   +2 more
core   +1 more source

MLSFF: Multi-level structural features fusion for multi-modal knowledge graph completion

open access: yesMathematical Biosciences and Engineering, 2023
With the rise of multi-modal methods, multi-modal knowledge graphs have become a better choice for storing human knowledge. However, knowledge graphs often suffer from the problem of incompleteness due to the infinite and constantly updating nature of ...
Hanming Zhai   +4 more
doaj   +1 more source

Improved RANSAC features image-matching method based on SURF

open access: yesThe Journal of Engineering, 2019
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj   +1 more source

Home - About - Disclaimer - Privacy