Results 81 to 90 of about 36,499 (202)
On the (Mis)Use of Machine Learning With Panel Data
ABSTRACT We provide the first systematic assessment of data leakage issues in the use of machine learning on panel data. Our organising framework clarifies why neglecting the cross‐sectional and longitudinal structure of these data leads to hard‐to‐detect data leakage, inflated out‐of‐sample performance, and an inadvertent overestimation of the real ...
Augusto Cerqua +2 more
wiley +1 more source
Systemization of Pluggable Transports for Censorship Resistance [PDF]
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano +2 more
core
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
Abstractions, accounts and grid usability [PDF]
The vision of the Grid is one of seamless, virtual and constantly changing resources where users need not concern themselves about details, such as exactly where an application is running or where their data is being stored. However, seamless and virtual
Hartswood, Mark +6 more
core
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall
Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS) solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent many types of attacks, such as XSS and SQL-injection. In this paper, deep
Ali Moradi Vartouni +3 more
doaj
Objective. The goal of the research is to develop an artificial neural network (ANN) to detect and neutralize network DDoS attacks.Method. The research is based on the use of the Python programming language in an environment that supports the training ...
P. V. Razumov +2 more
doaj +1 more source
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
Web applications increasingly face evasive and polymorphic attack payloads, yet traditional Web Application Firewalls (WAFs) based on static rule sets such as the Open Web Application Security Project (OWASP) Core Rule Set (CRS) often miss obfuscated or ...
Heba Osama +6 more
doaj +1 more source
We present a real-world dataset capturing thirty consecutive days of malicious HTTP traffic filtered and blocked by the OWASP ModSecurity Web Application Firewall (WAF) on a live production server.
Geza Lucz, Bertalan Forstner
doaj +1 more source
Aim: Virtual patients (VPs) are a one-of-a-kind e-learning resource, fostering clinical reasoning skills through clinical case examples. The combination with face-to-face teaching is important for their successful integration, which is referred to as ...
Lehmann, Ronny +6 more
doaj +1 more source

