Showing 521 - 540 results of 5,457 for search 'detection programs', query time: 0.15s Refine Results
  1. 521

    Detection of Toxoplasma gondii Infection in Rodents, Shrews and Cats in Unguja Island, Zanzibar by Cynthia M. Paul, Ally A. Ally, Ernatus M. Mkupasi, Martin J. Martin, Abdul A.S. Katakweba

    Published 2024-10-01
    “…Fifty-one seropositive samples from cats were detected where eight were from pet cats and 43 from stray cats. …”
    Get full text
    Article
  2. 522
  3. 523
  4. 524

    Detecting and identifying Schistosoma infections in snails and aquatic habitats: A systematic review. by Bishoy Kamel, Martina R Laidemitt, Lijun Lu, Caitlin Babbitt, Ola Liota Weinbaum, Gerald M Mkoji, Eric S Loker

    Published 2021-03-01
    “…Ability to detect schistosome infections in snails or in the water is needed if control and elimination programs hope to succeed. …”
    Get full text
    Article
  5. 525
  6. 526
  7. 527
  8. 528
  9. 529

    DeepRD:LSTM-based Siamese network for Android repackaged applications detection by Run WANG, Benxiao TANG, Li’na WANG

    Published 2018-08-01
    “…The state-of-art techniques in Android repackaging detection relied on experts to define features,however,these techniques were not only labor-intensive and time-consuming,but also the features were easily guessed by attackers.Moreover,the feature representation of applications which defined by experts cannot perform well to the common types of repackaging detection,which caused a high false negative rate in the real detection scenario.A deep learning-based repackaged applications detection approach was proposed to learn the program semantic features automatically for addressing the above two issues.Firstly,control and data flow analysis were taken for applications to form a sequence feature representation.Secondly,the sequence features were transformed into vectors based on word embedding model to train a Siamese LSTM network for automatically program feature learning.Finally,repackaged applications were detected based on the similarity measurement of learned program features.Experimental results show that the proposed approach achieves a precision of 95.7% and false negative rate of 6.2% in an open sourced dataset AndroZoo.…”
    Get full text
    Article
  10. 530
  11. 531
  12. 532
  13. 533
  14. 534
  15. 535
  16. 536
  17. 537
  18. 538

    Research on industrial control system intrusion detection method based on simulation modelling by Yi-wei GAO, Rui-kang ZHOU, Ying-xu LAI, Ke-feng FAN, Xiang-zhen YAO, Lin LI

    Published 2017-07-01
    “…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
    Get full text
    Article
  19. 539

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article
  20. 540

    MAGECODE: Machine-Generated Code Detection Method Using Large Language Models by Hung Pham, Huyen Ha, van Tong, Dung Hoang, Duc Tran, Tuyen Ngoc Le

    Published 2024-01-01
    “…Consequently, various machine-generated text (MGT) detection methods, developed from metric-based and model-based approaches, were proposed and shown to be highly effective. …”
    Get full text
    Article