GI-CTC - Artigos: Envíos recentes
Mostrando ítems 11-15 de 74
-
Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families
(Oxford University Press, 2024-05-20)[Abstract] As it is well known, mobile phones have become a basic gadget for any individual that usually stores sensitive information. This mainly motivates the increase in the number of attacks aimed at jeopardizing ... -
Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems
(Oxford University Press, 2024)[Abstract] The present research describes a novel adaptive anomaly detection method to optimize the performance of nonlinear and time-varying systems. The proposal integrates a centroid-based approach with the real-time ... -
Clustering techniques performance comparison for predicting the battery state of charge: A hybrid model approach
(Oxford University Press, 2024-05-09)[Abstract] Batteries are a fundamental storage component due to its various applications in mobility, renewable energies and consumer electronics among others. Regardless of the battery typology, one key variable from a ... -
Exploring the Efficacy of Binary Surveys versus Likert Scales in Assessing Student Perspectives Using Bayesian Analysis
(MDPI, 2024-05)[Abstract] Likert-scale surveys are the undeniable protagonists of online evaluations. They ask the respondent to express their degree of agreement with a series of statements related to the development of a subject. In ... -
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024)[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems ...