|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour...
ver más
|
|
|
|
|
|
|
João Alves Coelho, André Glória and Pedro Sebastião
Water is a crucial natural resource, and it is widely mishandled, with an estimated one third of world water utilities having loss of water of around 40% due to leakage. This paper presents a proposal for a system based on a wireless sensor network desig...
ver más
|
|
|
|
|
|
|
Xu Jiang, Dejun Mu and Huixiang Zhang
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing secur...
ver más
|
|
|
|
|
|
|
Ðorde Krivokapic, Danilo Krivokapic, Ivan Todorovic, Stefan Komazec
Pág. 1 - 10
Personal data protection is becoming a major research topic in the last decades. With the technological advances, this issue was given a completely new perspective, due to increased possibilities for both use and misuse. Personal data have become a very ...
ver más
|
|
|
|
|
|
|
Uma Rajasekaran, Mohanaprasad Kothandaraman and Chang Hong Pua
Significant water loss caused by pipeline leaks emphasizes the importance of effective pipeline leak detection and localization techniques to minimize water wastage. All of the state-of-the-art approaches use deep learning (DL) for leak detection and cro...
ver más
|
|
|
|
|
|
|
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M
Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu...
ver más
|
|
|
|
|
|
|
Dominik Wunderlich, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau and Thorsten Strufe
Hierarchical text classification consists of classifying text documents into a hierarchy of classes and sub-classes. Although Artificial Neural Networks have proved useful to perform this task, unfortunately, they can leak training data information to ad...
ver más
|
|
|
|
|
|
|
Guangming Wang, Yue Song, Jiabo Wang, Wanqiang Chen, Yunlian Cao and Jinxing Wang
The failure of a hydraulic system will affect the shifting quality and driving safety of a CVT tractor. In order to reveal the response of the tractor under different hydraulic system failures without destroying the transmission, the following methods ar...
ver más
|
|
|
|
|
|
|
Muhammad Sohaib, Manjurul Islam, Jaeyoung Kim, Duck-Chan Jeon and Jong-Myon Kim
Spherical storage tanks are used in various industries to store substances like gasoline, oxygen, waste water, and liquefied petroleum gas (LPG). Cracks in the storage tanks are unaccepted defects, as storage tanks can leak or spill the contained substan...
ver más
|
|
|
|
|
|
|
S. V. Hayrapetyan,K.S. Zaytsev
Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ...
ver más
|
|
|
|
|
|
|
S. V. Hayrapetyan,K.S. Zaytsev
Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ...
ver más
|
|
|
|
|
|
|
Daniel Barros, Isabela Almeida, Ariele Zanfei, Gustavo Meirelles, Edevar Luvizotto, Jr. and Bruno Brentan
Leakages in distribution networks reach more than 30% of the water supplied, entailing important risks for the water infrastructure with water contamination issues. Therefore, it is necessary to develop new methods to mitigate the amount of water wastes....
ver más
|
|
|
|
|
|
|
Oscar Scussel, Michael J. Brennan, Fabrício Cézar L. de Almeida, Mauricio K. Iwanaga, Jennifer M. Muggleton, Phillip F. Joseph and Yan Gao
The frequency range of the leak noise in buried water pipes, measured using acoustic correlators, depends significantly on the type of pipe and its location as well as the type of sensors used. Having a rough idea of this frequency range can be beneficia...
ver más
|
|
|
|
|
|
|
Te-Kwei Wang, Yu-Hsun Lin, Jian-Yuan Shen
Pág. 169 - 180
This research proposes an artificial intelligence (AI) detection model using convolutional neural networks (CNN) to automatically detect gas leaks in a long-distance pipeline. The change of gap pressure is collected when leakage occurs in the pipeline, a...
ver más
|
|
|
|
|
|
|
Guoqing Jin, Zhe Sun, Zhi Zong, Li Zou and Yingjie Hu
A novel technique based on conformal mapping and the circle theorem has been developed to tackle the boundary penetration issue, in which vortex blobs leak into structures in two-dimensional discrete vortex simulations, as an alternative to the tradition...
ver más
|
|
|
|
|
|
|
Likittanawong Supawat and Leemakdej Arnat
Studies that quantify the price impact of the information in corporate press releases and news articles mainly focus on quantitative news, such as earnings announcements, dividends, and financial performance-related events, but leave out other corporate ...
ver más
|
|
|
|
|
|
|
José García, Andres Leiva-Araos, Emerson Diaz-Saavedra, Paola Moraga, Hernan Pinto and Víctor Yepes
Water infrastructure integrity, quality, and distribution are fundamental for public health, environmental sustainability, economic development, and climate change resilience. Ensuring the robustness and quality of water infrastructure is pivotal for sec...
ver más
|
|
|
|
|
|
|
Islam T. Almalkawi,Jafar Raed,Ayoub Alsarhan,Alaa Abdallah,Emad Abdallah
Pág. pp. 43 - 69
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the priva...
ver más
|
|
|
|
|
|
|
Andrei Tevyashev,Olga Matviyenko,Glib Nikitenko
Pág. 29 - 38
We have constructed a stochastic model of a water supply network with leaks, which, compared to the previously proposed models (excluding leaks), more adequately describes the processes of transportation and water distribution in water supply systems. Ma...
ver más
|
|
|
|