Results 21 to 30 of about 459,551 (229)

Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN

open access: yesDigital Communications and Networks, 2022
Computer-empowered detection of possible faults for Heating, Ventilation and Air-Conditioning (HVAC) subsystems, e.g., chillers, is one of the most important applications in Artificial Intelligence (AI) integrated Internet of Things (IoT).
Ke Yan, Xiaokang Zhou
doaj   +1 more source

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and ...
Naglaa Ibrahim, Hana Usman
doaj   +1 more source

Verifying security protocols by knowledge analysis [PDF]

open access: yes, 2008
This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols.
Cheng, X, Ma, X
core   +1 more source

UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY [PDF]

open access: yesProceedings on Engineering Sciences
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks.
Rahul Kumar Sharma   +3 more
doaj   +1 more source

A Formal Model for Trust in Dynamic Networks [PDF]

open access: yes, 2003
We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation.
Carbone, M., Nielsen, M., Sassone, V.
core   +5 more sources

Benefits of Location-Based Access Control:A Literature Study [PDF]

open access: yes, 2010
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system.
Cleeff, AndrĂ© van   +2 more
core   +2 more sources

IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism

open access: yesJournal of Big Data, 2021
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi   +3 more
doaj   +1 more source

The application of blockchain technology in data trading: a systematic review [PDF]

open access: yesPeerJ Computer Science
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj   +2 more sources

Representative Names of Computing Degree Programs Worldwide [PDF]

open access: yes, 2018
Through the auspices of ACM and with support from the IEEE Computer Society, a task group charged to prepare the IT2017 report conducted an online international survey of computing faculty members about their undergraduate degree programs in computing ...
Clear, Alison   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy