18   Artículos

 
en línea
Zhengbao Li, Jianfeng Dai, Yuanxin Luan, Nan Sun and Libin Du    
Human marine activities are becoming increasingly frequent. The adverse marine environment has led to an increase in man overboard incidents, resulting in significant losses of life and property. After a drowning accident, the accurate location informati... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fahim Sufi    
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe... ver más
Revista: Information    Formato: Electrónico

 
en línea
Choirul Huda,Herman Tolle,Fitri Utaminingrum     Pág. pp. 16 - 30
Sleepiness during driving is a dangerous problem faced by all countries. Many studies have been conducted and stated that sleepiness threatens the driver himself and other peoples. The victim not only suffered minor injuries but also many of them ended i... ver más

 
en línea
Shengying Yang, Huibin Qin, Xiaolin Liang and Thomas Aaron Gulliver    
Life sign detection is important in many applications, such as locating disaster victims. This can be difficult in low signal to noise ratio (SNR) and through-wall conditions. This paper considers life sign detection using an impulse ultra-wideband (UWB)... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Gustavo A. Cardona and Juan M. Calderon    
Cooperative behaviors in multi-robot systems emerge as an excellent alternative for collaboration in search and rescue tasks to accelerate the finding survivors process and avoid risking additional lives. Although there are still several challenges to be... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
S. H. Kok, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam    
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Hsiao-Chung Lin, Ping Wang and Wen-Hui Lin    
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing ap... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mounir Hafsa and Farah Jemili    
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Inzar Salfikar, Indra Adji Sulistijono, Achmad Basuki     Pág. 234 - 254
Finding victims at a disaster site is the primary goal of Search-and-Rescue (SAR) operations. Many technologies created from research for searching disaster victims through aerial imaging. but, most of them are difficult to detect victims at tsunami disa... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Lynsay A. Shepherd, Jacqueline Archibald and Robert Ian Ferguson    
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behav... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »