|
|
|
Fahim Sufi
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe...
ver más
|
|
|
|
|
|
|
Hao Zhang, Junmin Meng, Lina Sun and Shibao Li
Internal solitary waves (ISWs) near the Dongsha Atoll in the northern South China Sea (SCS) can be divided into incident, reflected, and refracted waves. Compared with the incident and refracted ISWs, the reflected ISWs are less likely to appear, but the...
ver más
|
|
|
|
|
|
|
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th...
ver más
|
|
|
|
|
|
|
Kue-Hong Chen, Jeng-Hong Kao and Yi-Hui Hsu
In this manuscript, we will apply the regularized meshless method, coupled with an error estimation technique, to tackle the challenge of modeling oblique incident waves interacting with multiple cylinders. Given the impracticality of obtaining an exact ...
ver más
|
|
|
|
|
|
|
Peng He and Ruishan Sun
The efficient management of aviation safety requires the precise analysis of trends in incidents. While classical statistical models often rely on the autocorrelation of indicator sequences for trend fitting, significant room remains for performance impr...
ver más
|
|
|
|
|
|
|
Juliet Chebet Moso, Stéphane Cormier, Cyril de Runz, Hacène Fouchal and John Mwangi Wandeto
Intelligent transportation systems (ITS) enhance safety, comfort, transport efficiency, and environmental conservation by allowing vehicles to communicate wirelessly with other vehicles and road infrastructure. Cooperative awareness messages (CAMs) conta...
ver más
|
|
|
|
|
|
|
Cristian Chindrus and Constantin-Florin Caruntu
In today?s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readine...
ver más
|
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
|
Allan K. Nkwata, Ming Zhang, Xiao Song, Bruno Giordani and Amara E. Ezeamama
Background: Toxic stress (TS), resiliency-promoting factors (RPFs) and their interactions were investigated in relationship to incident dementia in a nationally representative sample (n = 6516) of American adults =50 years enrolled in the Health and Reti...
ver más
|
|
|
|
|
|
|
Zhuofei Xia, Jiayuan Gong, Hailong Yu, Wenbo Ren and Jingnan Wang
Situational detection in the traffic system is of great significance to traffic management and even urban management. Traditional detection methods are generally based on roadside equipment monitoring roads, and it is difficult to support large-scale and...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Zhiying Yang, Hao Ding, Ke Li, Liang Cheng, Bo Huang and Qingyang Ren
Large quasi-elliptical cylinders are extensively used in ocean engineering. To enhance a better understanding of the hydrodynamic wave force on such quasi-elliptical cylinders during extreme events, a series of experiments on extreme wave interaction wit...
ver más
|
|
|
|
|
|
|
Lucjan Gucma, Andrej Androjna, Kinga Lazuga, Peter Vidmar and Marko Perkovic
No advance in navigation has yet to prevent the occurrence of accidents (incidents are always implied when we discuss accidents) at sea. At the same time, advances in accident models are possible, and may provide the basis for investigations and analyses...
ver más
|
|
|
|
|
|
|
Tomás Madeira, Rui Melício, Duarte Valério and Luis Santos
In the aviation sector, human factors are the primary cause of safety incidents. Intelligent prediction systems, which are capable of evaluating human state and managing risk, have been developed over the years to identify and prevent human factors. Howe...
ver más
|
|
|
|
|
|
|
Darío Rodríguez-García, Vicente García-Díaz and Cristian González García
The final objective of smart cities is to optimize services and improve the quality of life of their citizens, who can play important roles due to the information they can provide. This information can be used in order to enhance many sectors involved in...
ver más
|
|
|
|
|
|
|
Hiroki Tawa, Hiromu Saiki, Yasuyuki Ota, Kenji Araki, Tatsuya Takamoto and Kensuke Nishioka
Because semiconductors absorb wavelengths dependent on the light absorption coefficient, photovoltaic (PV) energy output is affected by the solar spectrum. Therefore, it is necessary to consider the solar spectrum for highly accurate PV output estimation...
ver más
|
|
|
|
|
|
|
Julio Moreno, Manuel A. Serrano, Eduardo B. Fernandez and Eduardo Fernández-Medina
Big data ecosystems are increasingly important for the daily activities of any type of company. They are decisive elements in the organization, so any malfunction of this environment can have a great impact on the normal functioning of the company; secur...
ver más
|
|
|
|
|
|
|
Luís B. Elvas, Carolina F. Marreiros, João M. Dinis, Maria C. Pereira, Ana L. Martins and João C. Ferreira
Buildings in Lisbon are often the victim of several types of events (such as accidents, fires, collapses, etc.). This study aims to apply a data-driven approach towards knowledge extraction from past incident data, nowadays available in the context of a ...
ver más
|
|
|
|
|
|
|
Eric S. Weber, Steven N. Harding and Lee Przybylski
We introduce a novel methodology for anomaly detection in time-series data. The method uses persistence diagrams and bottleneck distances to identify anomalies. Specifically, we generate multiple predictors by randomly bagging the data (reference bags), ...
ver más
|
|
|
|
|
|
|
Francesco Bergadano, Fabio Carretto, Fabio Cogno and Dario Ragno
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modif...
ver más
|
|
|
|