Results 81 to 90 of about 36,499 (202)

On the (Mis)Use of Machine Learning With Panel Data

open access: yesOxford Bulletin of Economics and Statistics, Volume 88, Issue 3, Page 506-518, June 2026.
ABSTRACT We provide the first systematic assessment of data leakage issues in the use of machine learning on panel data. Our organising framework clarifies why neglecting the cross‐sectional and longitudinal structure of these data leads to hard‐to‐detect data leakage, inflated out‐of‐sample performance, and an inadvertent overestimation of the real ...
Augusto Cerqua   +2 more
wiley   +1 more source

Systemization of Pluggable Transports for Censorship Resistance [PDF]

open access: yes, 2016
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano   +2 more
core  

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Abstractions, accounts and grid usability [PDF]

open access: yes, 2006
The vision of the Grid is one of seamless, virtual and constantly changing resources where users need not concern themselves about details, such as exactly where an application is running or where their data is being stored. However, seamless and virtual
Hartswood, Mark   +6 more
core  

Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall

open access: yesInternational Journal of Information and Communication Technology Research, 2019
Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS) solutions for protecting web servers from HTTP attacks. WAF is a tool to identify and prevent many types of attacks, such as XSS and SQL-injection. In this paper, deep
Ali Moradi Vartouni   +3 more
doaj  

Creation and Training of artifical neural network for Detection and Neutralization of Network DDos–attacks(“Denial of Service”)

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The goal of the research is to develop an artificial neural network (ANN) to detect and neutralize network DDoS attacks.Method. The research is based on the use of the Python programming language in an environment that supports the training ...
P. V. Razumov   +2 more
doaj   +1 more source

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]

open access: yes, 2011
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David   +2 more
core   +1 more source

Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation

open access: yesIEEE Access
Web applications increasingly face evasive and polymorphic attack payloads, yet traditional Web Application Firewalls (WAFs) based on static rule sets such as the Open Web Application Security Project (OWASP) Core Rule Set (CRS) often miss obfuscated or ...
Heba Osama   +6 more
doaj   +1 more source

A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server

open access: yesData
We present a real-world dataset capturing thirty consecutive days of malicious HTTP traffic filtered and blocked by the OWASP ModSecurity Web Application Firewall (WAF) on a live production server.
Geza Lucz, Bertalan Forstner
doaj   +1 more source

Virtual Patients in continuing medical education and residency training: a pilot project for acceptance analysis in the framework of a residency revision course in pediatrics

open access: yesGMS Zeitschrift für Medizinische Ausbildung, 2015
Aim: Virtual patients (VPs) are a one-of-a-kind e-learning resource, fostering clinical reasoning skills through clinical case examples. The combination with face-to-face teaching is important for their successful integration, which is referred to as ...
Lehmann, Ronny   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy