Suggested Topics within your search.
Suggested Topics within your search.
- Automobiles 1
- Communication in rehabilitation 1
- Crimes against 1
- FICTION / Psychological 1
- FICTION / Thrillers 1
- Fathers and daughters 1
- Fault location (Engineering) 1
- Fiction 1
- Government policy 1
- Hastings, Stanley (Fictitious character) 1
- History 1
- Language 1
- Law 1
- Maintenance and repair 1
- Medical rehabilitation 1
- Moral and ethical aspects 1
- Motion picture industry 1
- Murder 1
- Mystery and detective stories 1
- Police 1
- Prevention 1
- Private investigators 1
- Psychological aspects 1
- Psychologists 1
- Psychology 1
- Rehabilitation 1
- Social aspects 1
- Technological innovations 1
- Telecommunication in medicine 1
- Telemedicine 1
-
181
Using deep learning for detecting BotCloud
Published 2016-11-01“…The differences of the basic network flow characteristics between BotCloud and normal cloud services were not obvious, and this led to the inefficiency of the method in BotCloud detection based on network flow characteristics analysis. …”
Get full text
Article -
182
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01Subjects: “…insider threat detection…”
Get full text
Article -
183
Modelling Oil-Spill Detection with Swarm Drones
Published 2014-01-01“…One of them is the detection and monitoring of pollutants to delimit their perimeter and area accurately. …”
Get full text
Article -
184
Tumor detection on bronchoscopic images by unsupervised learning
Published 2025-01-01“…To address this issue, a datasets for intratracheal tumor detection has been constructed to simulate the diagnostic level of experienced specialists, and a Knowledge Distillation-based Memory Feature Unsupervised Anomaly Detection (KD-MFAD) model was proposed to learn from this simulated experience. …”
Get full text
Article -
185
Advanced Imaging Modalities in the Detection of Cerebral Vasospasm
Published 2013-01-01“…Advances in imaging have provided clinicians with a multifaceted approach to assist in the detection of cerebral vasospasm and the diagnosis of delayed ischemic neurologic deficits (DIND). …”
Get full text
Article -
186
Refined feature enhancement network for object detection
Published 2024-11-01Subjects: Get full text
Article -
187
-
188
Motion detection for patient safety in CT scanner
Published 2025-03-01Subjects: Get full text
Article -
189
Integrated artificial immune system for intrusion detection
Published 2012-02-01Subjects: Get full text
Article -
190
SVDD: SAR Vehicle Dataset Construction and Detection
Published 2025-01-01Subjects: Get full text
Article -
191
Channeled Polarimetry for Magnetic Field/Current Detection
Published 2025-01-01“…It is shown that in contrast to other methods, this method allows the detection of the phase shift caused by Faraday rotation alone, making the detection independent of temperature. …”
Get full text
Article -
192
-
193
Floer homology and non-fibered knot detection
Published 2025-01-01“…We prove for the first time that knot Floer homology and Khovanov homology can detect non-fibered knots and that HOMFLY homology detects infinitely many knots; these theories were previously known to detect a mere six knots, all fibered. …”
Get full text
Article -
194
Hardware Trojans detection based on projection pursuit
Published 2013-04-01Subjects: Get full text
Article -
195
Survey of software anomaly detection based on deception
Published 2022-02-01“…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
Get full text
Article -
196
Detection of circular permutations by Protein Language Models
Published 2025-01-01“…Protein circular permutations are crucial for understanding protein evolution and functionality. Traditional detection methods face challenges: sequence-based approaches struggle with detecting distant homologs, while structure-based approaches are limited by the need for structure generation and often treat proteins as rigid bodies. …”
Get full text
Article -
197
Survey on adversarial attacks and defenses for object detection
Published 2023-11-01Subjects: “…object detection…”
Get full text
Article -
198
Detection of Bacterial Endospores in Soil by Terbium Fluorescence
Published 2011-01-01“…Our study might provide a basis for the detection of “hot spots” of bacterial spores in soil.…”
Get full text
Article -
199
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01Subjects: Get full text
Article -
200
Design of Unmanned Vehicle System for Disaster Detection
Published 2015-04-01“…The vehicle system is capable of detecting a variety of gases by the sensors deployed on it. …”
Get full text
Article