تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 1355 -- 1374 من 2211
-
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
( Association for Computing Machinery , 2022 , Article)With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ... -
Malware detection based on graph attention networks for intelligent transportation systems
( MDPI , 2021 , Article)Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their ... -
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ... -
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ... -
Managing criticalities of e-health IoT systems
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Lately, Internet-based solutions, brought by the Internet of Things (IoT) and cloud computation and storage technologies, have been driving revolutionary approaches in innumerable domains, including the sensitive domain ... -
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
( Nova Science Publishers, Inc. , 2009 , Book chapter)The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ... -
Managing Security Control Assumptions Using Causal Traceability
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ... -
The many benefits of annotator rationales for relevance judgments
( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ... -
Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ... -
MARL: Multimodal Attentional Representation Learning for Disease Prediction
( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)Existing learning models often utilise CT-scan images to predict lung diseases. These models are posed by high uncertainties that affect lung segmentation and visual feature learning. We introduce MARL, a novel Multimodal ... -
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
( Elsevier B.V. , 2006 , Article)The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ... -
MASACAD: a multiagent based approach to information customization
( IEEE , 2006 , Article)MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ... -
Mathematical Evaluation of Human Immune Systems for Securing Software Defined Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. ... -
Matrix Barcode Based Secure Authentication without Trusting Third Party
( IEEE Computer Society , 2019 , Article)The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials and saves it so that ... -
Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique
( IOS Press , 2018 , Article)The proper expression of the potentially useful but hidden information in large-scale datasets via using proper structure is vital important in both theory and applications of advanced pattern mining. The fundamental ... -
Maximizing energy efficiency for loss tolerant applications: The packet buffering case
( IEEE , 2013 , Conference Paper)Energy efficient communication has emerged as one of the key areas of research due to its impact on industry and environment. Any potential degree of freedom (DoF) available in the system should be exploited smartly to ... -
Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
( IEEE , 2015 , Article)Quality of service (QoS) for a network is characterized in terms of various parameters specifying packet delay and loss tolerance requirements for the application. The unpredictable nature of the wireless channel demands ... -
Maximizing Lifetime in Wireless Sensor Network for Structural Health Monitoring with and Without Energy Harvesting
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)This paper presents an optimization framework to maximize the lifetime of wireless sensor networks for structural health monitoring with and without energy harvesting. We develop a mathematical model and formulate the ... -
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ... -
MB-C: Check-in mobile application using barcodes
( International Business Information Management Association, IBIMA , 2008 , Conference Paper)This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...