-
141
-
142
Supporting secure dynamic alert zones using searchable encryption and graph embedding
منشور في 2023"…Our extensive experimental evaluation shows that our solutions can significantly improve computational overhead compared to existing baselines.…"
-
143
-
144
-
145
A novel mobile and vehicular Ad Hoc cloud framework for intursion detection. (c2017)
منشور في 2017"…Based on our IOD module, our approach is capable of significantly reducing energy consumption, execution time, and number of selected computational nodes.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
146
-
147
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain
منشور في 2024"…However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. …"
-
148
Modeling of photovoltaic soiling loss as a function of environmental variables
منشور في 2017"…Higher WS typically favored more positive daily ΔCI when RH was low, but at higher RH levels (>50%) daily ΔCI was more likely to be negative with increasing WS. In fact, high RH levels were related to negative daily ΔCI only at higher WS levels (>2ms−1); at lower WS levels RH had no significant effect on daily ΔCI. …"
-
149
-
150
-
151
Cybersecurity Transparency and Firm Success: Insights From the Australian Landscape
منشور في 2024"…<p dir="ltr">Amid the increasing prevalence of cybersecurity challenges on a global scale, the significance of disseminating details pertaining to a company's ability to counteract cybersecurity threats becomes evident, reflecting the vigilance and preparedness of the organization in addressing such risks. …"
-
152
-
153
LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT Systems
منشور في 2025"…The results highlight LightEnsemble-Guard as an effective, scalable and lightweight solution for real-time IoT security, significantly outperforming traditional models in both accuracy and computational efficiency.…"
-
154
-
155
Dimensional and positional temporomandibular joint osseous characteristics in normodivergent facial patterns with and without temporomandibular disorders
منشور في 2023"…Three-dimensional positional and dimensional temporomandibular joint characteristics, including glenoid fossa, mandibular condyles, and joint spaces, were assessed by cone beam computed tomography.</p><h3>Results</h3><p dir="ltr">The glenoid fossa positions in the three orthogonal planes and height showed statistical significance between the two studied groups. …"
-
156
-
157
-
158
Tamp-X: Attacking explainable natural language classifiers through tampered activations
منشور في 2022"…Recently Explainable Artificial Intelligence (XAI) methods have been proposed as a method for increasing DNN’s reliability and trustworthiness. These XAI methods are however open to attack and can be manipulated in both white-box (gradient-based) and black-box (perturbation-based) scenarios. …"
-
159
-
160
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …"