Results 31 to 40 of about 9,492,518 (363)

A trustworthy mobile agent infrastructure for network management [PDF]

open access: yes, 2007
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core   +1 more source

A Survey of Moving Target Defenses for Network Security [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2019
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to account for the attacker’s inherent advantage present due to the static nature of network services and configurations.
Sailik Sengupta   +5 more
semanticscholar   +1 more source

MLSFF: Multi-level structural features fusion for multi-modal knowledge graph completion

open access: yesMathematical Biosciences and Engineering, 2023
With the rise of multi-modal methods, multi-modal knowledge graphs have become a better choice for storing human knowledge. However, knowledge graphs often suffer from the problem of incompleteness due to the infinite and constantly updating nature of ...
Hanming Zhai   +4 more
doaj   +1 more source

Improved RANSAC features image-matching method based on SURF

open access: yesThe Journal of Engineering, 2019
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj   +1 more source

A machine learning-based approach to ERα bioactivity and drug ADMET prediction

open access: yesFrontiers in Genetics, 2023
By predicting ERα bioactivity and mining the potential relationship between Absorption, Distribution, Metabolism, Excretion, Toxicity (ADMET) attributes in drug research and development, the development efficiency of specific drugs for breast cancer will
Tianbo An   +6 more
doaj   +1 more source

Advanced modelling and recurrent analysis in network security: Scrutiny of data and fault resolution

open access: yesWorld Journal of Advanced Research and Reviews
This research dealt with the critical integration of advanced modelling techniques and recurrent analysis within network security, with a primary goal of enhancing the critical analysis of network data and improving fault resolution processes.
J. Chukwunweike   +2 more
semanticscholar   +1 more source

Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship

open access: yesMathematical Biosciences and Engineering, 2021
Spatial co-location pattern mining discovers the subsets of spatial features frequently observed together in nearby geographic space. To reduce time and space consumption in checking the clique relationship of row instances of the traditional co-location
Meijiao Wang   +3 more
doaj   +1 more source

Quantum Network: Security Assessment and Key Management [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2019
As an extension of quantum key distribution, secure communication among multiple users is a basic task in a quantum network. When the quantum network structure becomes complicated with a large number of users, it is important to investigate network ...
Hongyi Zhou   +3 more
semanticscholar   +1 more source

Effects of Degree Correlations in Interdependent Security: Good or Bad?

open access: yes, 2017
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents ...
La, Richard J.
core   +1 more source

Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker

open access: yesIET Information Security, 2022
After several years, crypto‐ransomware attacks still constitute a principal threat for individuals and organisations worldwide. Despite the fact that a number of solutions are deployed to fight against this plague, one main challenge is that of early ...
José Antonio Gómez‐Hernández   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy