22   Artículos

 
en línea
Mondher Bouazizi, Chuheng Zheng, Siyuan Yang and Tomoaki Ohtsuki    
A growing focus among scientists has been on researching the techniques of automatic detection of dementia that can be applied to the speech samples of individuals with dementia. Leveraging the rapid advancements in Deep Learning (DL) and Natural Languag... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma    
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber    
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yuefei Sun, Xianbo Sun, Tao Hu and Li Zhu    
Despite the widespread use of artificial intelligence-based methods in detecting electricity theft by smart grid customers, current methods suffer from two main flaws: a limited amount of data on electricity theft customers compared to that on normal cus... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang and Yi-Wen Lai    
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nasir Ayub, Usman Ali, Kainat Mustafa, Syed Muhammad Mohsin and Sheraz Aslam    
In the smart grid (SG), user consumption data are increasing very rapidly. Some users consume electricity legally, while others steal it. Electricity theft causes significant damage to power grids, affects power supply efficiency, and reduces utility rev... ver más
Revista: Forecasting    Formato: Electrónico

 
en línea
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko    
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Rajiv Punmiya and Sangho Choe    
Smart Grid (SG); Smart City; Demand Side Management (DSM); Building Energy Management System; Home Energy Management System.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni    
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muhammad Adil, Nadeem Javaid, Umar Qasim, Ibrar Ullah, Muhammad Shafiq and Jin-Ghoo Choi    
The electrical losses in power systems are divided into non-technical losses (NTLs) and technical losses (TLs). NTL is more harmful than TL because it includes electricity theft, faulty meters and billing errors. It is one of the major concerns in the po... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »