Results 81 to 90 of about 9,492,518 (363)

Research on a Framework for Chinese Argot Recognition and Interpretation by Integrating Improved MECT Models

open access: yesEntropy
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li   +3 more
doaj   +1 more source

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

open access: yesPLoS ONE, 2016
A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from ...
Min-Joo Kang, Je-Won Kang
semanticscholar   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

open access: yes, 2016
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N.   +6 more
core   +1 more source

A Survey on Network Security-Related Data Collection Technologies

open access: yesIEEE Access, 2018
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats.
Huaqing Lin   +3 more
semanticscholar   +1 more source

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

An Efficient and Intelligent Interest-Based Personalized Search Over Encrypted Outsourced Data in Clouds

open access: yesIET Information Security
As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy
Guoxiu Liu   +4 more
doaj   +1 more source

Learning to Customize Network Security Rules

open access: yes, 2017
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705)   +4 more
core   +6 more sources

Robot‐Assisted Automated Serial‐Sectioning and Imaging for 3D Microstructural Investigations

open access: yesAdvanced Engineering Materials, EarlyView.
A fully automated 3D microstructure characterization platform provides new insights into materials. This robot‐assisted system performs serial‐sectioning, etching, and optical imaging to generate large‐volume 3D reconstructions with submicron resolution.
Michael Moschetti   +7 more
wiley   +1 more source

Deep Spatio-Temporal Graph Attention Network for Street-Level 110 Call Incident Prediction

open access: yesApplied Sciences
Recent advancements in crime prediction have increasingly focused on street networks, which offer finer granularity and a closer reflection of real-world urban dynamics.
Jinguang Sui, Peng Chen, Haishuo Gu
doaj   +1 more source

Home - About - Disclaimer - Privacy