Results 81 to 90 of about 9,492,518 (363)
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li +3 more
doaj +1 more source
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from ...
Min-Joo Kang, Je-Won Kang
semanticscholar +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N. +6 more
core +1 more source
A Survey on Network Security-Related Data Collection Technologies
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats.
Huaqing Lin +3 more
semanticscholar +1 more source
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley +1 more source
As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy
Guoxiu Liu +4 more
doaj +1 more source
Learning to Customize Network Security Rules
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705) +4 more
core +6 more sources
Robot‐Assisted Automated Serial‐Sectioning and Imaging for 3D Microstructural Investigations
A fully automated 3D microstructure characterization platform provides new insights into materials. This robot‐assisted system performs serial‐sectioning, etching, and optical imaging to generate large‐volume 3D reconstructions with submicron resolution.
Michael Moschetti +7 more
wiley +1 more source
Deep Spatio-Temporal Graph Attention Network for Street-Level 110 Call Incident Prediction
Recent advancements in crime prediction have increasingly focused on street networks, which offer finer granularity and a closer reflection of real-world urban dynamics.
Jinguang Sui, Peng Chen, Haishuo Gu
doaj +1 more source

