101   Artículos

 
en línea
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv    
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hyeong-Geun Kim and Donghyun Beck    
We propose an integrated guidance and control law for dual-controlled interceptor dynamics controlled via tail-fin deflection and reaction jets. Because dual-controlled interceptors have two input channels in each axis, we define two error variables as t... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin    
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon... ver más
Revista: Information    Formato: Electrónico

 
en línea
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information    Formato: Electrónico

 
en línea
Siliang Du, Yi Zha and Qijun Zhao    
The concept of the Fan Wing, a novel aircraft vector-force-integrated device that combines a power unit with a fixed wing to generate distributed lift and thrust by creating a low-pressure vortex on the wing?s surface, was studied. To investigate the uni... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu    
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Haoyu Cheng, Dan Zhao, Nay Lin Oo, Xiran Liu and Xu Dong    
Ice accretion is inevitable on fix-wing UAVs (unmanned aerial vehicles) when they are applied to surveillance and mapping over colder climates and arctic regions. Subsequent aerodynamic profile changes have caused the current interest in the better predi... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Cristian Chindrus and Constantin-Florin Caruntu    
In today?s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly    
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »