Showing 281 - 300 results of 841 for search 'security in visualization', query time: 0.10s Refine Results
  1. 281
  2. 282

    A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology by Di Li, Zhibang Yang, Siyang Yu, Mingxing Duan, Shenghong Yang

    Published 2024-09-01
    “…However, this shift has introduced a new array of security challenges, necessitating innovative approaches distinct from traditional network security architectures. …”
    Get full text
    Article
  3. 283

    Does Digitalization Lead to Better Transparency: Bibliometric Approach by Pavlo Kostetskyi

    Published 2021-09-01
    “…The density visualization showed that the most relevant keywords in publications on transparency and digitalization are digitalization, blockchain, and industry 4.0. …”
    Get full text
    Article
  4. 284

    INFORMATION-ANALYTICAL SYSTEM OF MONITORING OF THE SHADOW OF NON-CASH FLOW: BASIC ELEMENTS, AUTHOR’S SIMULATION ALGORITHM by E. Baturina

    Published 2019-09-01
    “…The purpose of this article is to present the economic and mathematical toolkit for the analysis of information about the shadow activity of subjects of economic crimes and visualization of the structure of the information and analytical system for monitoring the shadow cash flow. …”
    Get full text
    Article
  5. 285

    Modelling and simulation of the block pouring construction system considering spatial–temporal conflict of construction machinery in arch dams by Zhipeng Liang, Jiayao Peng, Chunju Zhao, Huawei Zhou, Dongfeng Li, Yihong Zhou, Quan Liu, Xiaodong Li, Cheng Zhang, Fang Wang

    Published 2025-08-01
    “…Combined with the typical pouring block in Baihetan arch dam, the construction process is simulated and the visualization system is developed, which achieves the information integration such as the quantification of the spatial–temporal conflict, the analysis of the influence effects, and the visualization of conflict information. …”
    Get full text
    Article
  6. 286
  7. 287

    Ultrasound Guidance for Deep Peripheral Nerve Blocks: A Brief Review by Anupama Wadhwa, Sunitha Kanchi Kandadai, Sujittra Tongpresert, Detlef Obal, Ralf Erich Gebhard

    Published 2011-01-01
    “…The use of ultrasound does not replace experience and knowledge of relevant anatomy, especially for visualization of deep structures. In certain scenarios, ultrasound may not offer additional value and substantial amount of time may be spent trying to find relevant structures or even provide a false sense of security, especially to an inexperienced operator. …”
    Get full text
    Article
  8. 288

    Exploring multiple optimization algorithms in transfer learning with EfficientNet models for agricultural insect classification by Hoang-Tu Vo, Nhon Nguyen Thien, Kheo Chau Mui, Huan Lam Le, Phuc Pham Tien

    Published 2024-10-01
    “… Dangerous insects are a significant risk to the global agricultural industry, threatening food security, economic stability, and crop quality. This study investigates the impact of multiple optimization algorithms within transfer learning, employing EfficientNet models for the classification of agricultural insects. …”
    Get full text
    Article
  9. 289

    Exploring multiple optimization algorithms in transfer learning with EfficientNet models for agricultural insect classification by Hoang-Tu Vo, Nhon Nguyen Thien, Kheo Chau Mui, Huan Lam Le, Phuc Pham Tien

    Published 2024-10-01
    “… Dangerous insects are a significant risk to the global agricultural industry, threatening food security, economic stability, and crop quality. This study investigates the impact of multiple optimization algorithms within transfer learning, employing EfficientNet models for the classification of agricultural insects. …”
    Get full text
    Article
  10. 290

    Modellierung von Zweifel – Vorbild TEI im Graphen by Andreas Kuczera, Dominik Kasper

    Published 2019-07-01
    “…This applies in particular if additional information on the degree of security of a resolution is possible. Graph technologies offer possibilities for modeling, visualization and analysis of uncertainty and responsibility. …”
    Get full text
    Article
  11. 291
  12. 292
  13. 293

    Design and development of an efficient RLNet prediction model for deepfake video detection by Varad Bhandarkawthekar, T. M. Navamani, Rishabh Sharma, K. Shyamala

    Published 2025-07-01
    “…This research significantly contributes to digital media forensics by providing an advanced tool for detecting deepfake videos, enhancing digital content's security and integrity. The efficacy and resilience of the proposed system are evidenced by deepfake detection, while our visualization-based interpretability provides insights into our model.…”
    Get full text
    Article
  14. 294

    Adaptable Reduced-Complexity Approach Based on State Vector Machine for Identification of Criminal Activists on Social Media by Imran Shafi, Sadia Din, Zahid Hussain, Imran Ashraf, Gyu Sang Choi

    Published 2021-01-01
    “…Security agencies face an emerging challenge of identifying and counter the malicious contents spread on the social media by the terrorists. …”
    Get full text
    Article
  15. 295

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  16. 296

    A dynamic airspace grid map based on 3D subdivision framework by B. Han, T. Qu

    Published 2025-07-01
    “…Grid map also models static and dynamic airspace, including obstacles, dynamic airspace attributes, aircraft, and can achieve intelligent visualization of time- variance airspace. Finally, the dynamic airspace grid map can organize and store static and dynamic spatial data based on a 3D subdivision framework to ensure the orderliness and security of the airspace domain.…”
    Get full text
    Article
  17. 297
  18. 298

    Application of deep learning in malware detection: a review by Yafei Song, Dandan Zhang, Jian Wang, Yanan Wang, Yang Wang, Peng Ding

    Published 2025-04-01
    “…Abstract The defense of malware remains an important research hotspot in the field of cyberspace security. Recognizing its profound research significance, our defense against malware is still an important research hotspot in the field of cyberspace security. …”
    Get full text
    Article
  19. 299
  20. 300

    New Images of the Globalized World Crossed by Artificial Intelligence by Vanina Rodríguez

    Published 2023-12-01
    “…Finally, there must be more robust data privacy and security regulations to protect users' data and ensure that it is not misused.…”
    Get full text
    Article