Results 31 to 40 of about 9,492,518 (363)
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
A Survey of Moving Target Defenses for Network Security [PDF]
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to account for the attacker’s inherent advantage present due to the static nature of network services and configurations.
Sailik Sengupta +5 more
semanticscholar +1 more source
MLSFF: Multi-level structural features fusion for multi-modal knowledge graph completion
With the rise of multi-modal methods, multi-modal knowledge graphs have become a better choice for storing human knowledge. However, knowledge graphs often suffer from the problem of incompleteness due to the infinite and constantly updating nature of ...
Hanming Zhai +4 more
doaj +1 more source
Improved RANSAC features image-matching method based on SURF
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj +1 more source
A machine learning-based approach to ERα bioactivity and drug ADMET prediction
By predicting ERα bioactivity and mining the potential relationship between Absorption, Distribution, Metabolism, Excretion, Toxicity (ADMET) attributes in drug research and development, the development efficiency of specific drugs for breast cancer will
Tianbo An +6 more
doaj +1 more source
Advanced modelling and recurrent analysis in network security: Scrutiny of data and fault resolution
This research dealt with the critical integration of advanced modelling techniques and recurrent analysis within network security, with a primary goal of enhancing the critical analysis of network data and improving fault resolution processes.
J. Chukwunweike +2 more
semanticscholar +1 more source
Spatial co-location pattern mining discovers the subsets of spatial features frequently observed together in nearby geographic space. To reduce time and space consumption in checking the clique relationship of row instances of the traditional co-location
Meijiao Wang +3 more
doaj +1 more source
Quantum Network: Security Assessment and Key Management [PDF]
As an extension of quantum key distribution, secure communication among multiple users is a basic task in a quantum network. When the quantum network structure becomes complicated with a large number of users, it is important to investigate network ...
Hongyi Zhou +3 more
semanticscholar +1 more source
Effects of Degree Correlations in Interdependent Security: Good or Bad?
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents ...
La, Richard J.
core +1 more source
Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker
After several years, crypto‐ransomware attacks still constitute a principal threat for individuals and organisations worldwide. Despite the fact that a number of solutions are deployed to fight against this plague, one main challenge is that of early ...
José Antonio Gómez‐Hernández +2 more
doaj +1 more source

