212   Artículos

 
en línea
Xi Duan, Jian Liu and Xinjie Wang    
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Jiao Su, Yi An, Jialin Wu and Kai Zhang    
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin    
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Zhiguo Chen and Xuanyu Ren    
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to comput... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Endrowednes Kuantama, Avishkar Seth, Alice James and Yihao Zhang    
The effectiveness of human security-based guard patrol systems often faces challenges related to the consistency of perimeter checks regarding timing and patterns. Some solutions use autonomous drones for monitoring assistance but primarily optimize thei... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Amjad Alraizza and Abdulmohsen Algarni    
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi    
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek    
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter    
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 13     Siguiente »