Showing 6,821 - 6,840 results of 8,012 for search 'Cropani~', query time: 3.28s Refine Results
  1. 6821
  2. 6822
  3. 6823
  4. 6824

    Insider threat detection based on operational attention and data augmentation by Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN

    Published 2023-06-01
    “…In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detection lies in data imbalance and the limited number of labeled threat samples.In the Cert R4.2 dataset, which is a classic dataset for insider threat detection, there are over 3.22 million log data, but only 7,423 are marked as malicious operation logs.Furthermore, most of the operation types in the logs are not related to malicious behavior, and only two types of operations are highly correlated with malicious behavior, such as leaking company data, creating interference in the detection process.To address this challenge, a data processing framework was designed based on operational attention and data augmentation.Anomaly evaluation was first performed on operations by the framework, and operations with low anomaly scores were then masked.This makes the model better focus on operations related to malicious behavior, which can be considered as a hard attention mechanism for operations.Next, the characteristics of the insider threat dataset were analyzed, and three rules were designed for data augmentation on malicious samples to increase the diversity of samples and alleviate the substantial imbalance between positive and negative samples.Supervised insider threat detection was regarded as a time-series classification problem.Residual connections were added to the LSTM-FCN model to achieve multi-granularity detection, and indicators such as precision rate and recall rate were used to evaluate the model.The results indicate superior performance over existing baseline models.Moreover, the data processing framework was implemented on various classic models, such as ITD-Bert and TextCNN, and the results show that the methods effectively improve the performance of insider threat detection models.…”
    Get full text
    Article
  5. 6825
  6. 6826

    Competitiveness of Russian Universities in the Global System of Higher Education: Quantitative Analysis by D. A. Endovitsky, V. V. Korotkikh, M. V. Voronova

    Published 2020-03-01
    “…We obtained dataset for the study from the analytical materials of the British consulting company QS, as well as information and analytical materials from the results of monitoring the effectiveness of educational institutions of higher education in the Russian Federation.Conclusions. …”
    Get full text
    Article
  7. 6827
  8. 6828
  9. 6829

    ECONOMIC SANCTIONS AS A CONCEPT OF POWER POLITICS by I. N. Timofeev

    Published 2018-07-01
    “…Legal and economic literature study sanctions by means of legal norms analysis and their impact on economies, companies and corporations. However, this approach misses a political component, specially the one of coercion to comply with international norms or requirements of sanctions’ initiators. …”
    Get full text
    Article
  10. 6830

    New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms by Zikang Peng

    Published 2022-01-01
    “…Based on the development factors in the new media environment, combined with marketing theory, it puts forward suggestions for catering companies to use new media to carry out marketing planning in product innovation, improving information channels, creating network events and topics, and promoting innovation and health in the catering industry. …”
    Get full text
    Article
  11. 6831
  12. 6832
  13. 6833

    To be agents or not to be agents, that is the question: the impact of the online platforms revolution on the notion of agency under EU competition law by Luca Villani

    Published 2020-10-01
    “…Value flew in a linear way from producers to consumers. Companies are nowadays increasingly shifting from the value chain model to a more complex business model, i.e. the platform model. …”
    Get full text
    Article
  14. 6834
  15. 6835
  16. 6836
  17. 6837
  18. 6838

    CONTINGENCY FACTORS AND MANAGEMENT ACCOUNTING PRACTICES OF LISTED MANUFACTURING FIRMS IN LAGOS STATE by Mustapha Abdulrasaq, Abdullahi Adio Babatunde, Isaac Biodun Ogunshola

    Published 2023-10-01
    “…Cross-sectional research design was employed to collect surveyed data from randomly selected 327 senior management staff of manufacturing companies in Lagos. The obtained data through closed-ended questionnaire was analyzed using descriptive statistics (proportion and measure of central tendency) and inferential statistics (multiple regression analysis) to estimate predictors. …”
    Get full text
    Article
  19. 6839

    Effects of Housing Systems on Production Performance, Egg Quality, Tonic Immobility and Feather Score in Laying Hens by Mert Erek, Erdal Matur

    Published 2024-11-01
    “…Methods One hundred and twenty 42‐week‐old “Atak S” laying hens, purchased from a manufacturing company, were randomly assigned to 4 housing systems: conventional cages, furnished cages, deep‐litter system and free‐range. …”
    Get full text
    Article
  20. 6840

    “Italy System” as a Case of Innovative Economic Diplomacy by R. O. Raynkhardt

    Published 2015-12-01
    “…The author looks into concrete mechanisms of economic diplomacy which basically include measures of national export promotion and assistance to Italian companies in the course of new markets penetration, as well as measures on attraction of foreign direct investment inter alia from developing countries. …”
    Get full text
    Article