GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2015
    In:  IEEE Transactions on Computers Vol. 64, No. 8 ( 2015-8-1), p. 2382-2393
    In: IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers (IEEE), Vol. 64, No. 8 ( 2015-8-1), p. 2382-2393
    Type of Medium: Online Resource
    ISSN: 0018-9340
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015
    detail.hit.zdb_id: 1473005-4
    detail.hit.zdb_id: 218504-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    World Scientific Pub Co Pte Ltd ; 2023
    In:  Stochastics and Dynamics Vol. 23, No. 01 ( 2023-02)
    In: Stochastics and Dynamics, World Scientific Pub Co Pte Ltd, Vol. 23, No. 01 ( 2023-02)
    Abstract: In this paper, we study a class of space-time fractional Anderson model driven by multiplicative Gaussian noise which is white/colored in time and has the covariance of a fractional Brownian motion with Hurst index [Formula: see text] in space. We prove the existence of the solution in the Skorohod sense and obtain the upper and lower bounds for the [Formula: see text] th moments for all [Formula: see text]. Then we can prove that solution of this equation in the Skorohod sense is weakly intermittent. We also deduce the Hölder continuity of the solution with respect to the time and space variables.
    Type of Medium: Online Resource
    ISSN: 0219-4937 , 1793-6799
    RVK:
    Language: English
    Publisher: World Scientific Pub Co Pte Ltd
    Publication Date: 2023
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2023
    In:  IEEE Transactions on Knowledge and Data Engineering Vol. 35, No. 11 ( 2023-11-1), p. 11769-11783
    In: IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers (IEEE), Vol. 35, No. 11 ( 2023-11-1), p. 11769-11783
    Type of Medium: Online Resource
    ISSN: 1041-4347 , 1558-2191 , 2326-3865
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2023
    detail.hit.zdb_id: 1001468-8
    detail.hit.zdb_id: 2026620-0
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Software: Practice and Experience, Wiley
    Abstract: Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.
    Type of Medium: Online Resource
    ISSN: 0038-0644 , 1097-024X
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 120252-2
    detail.hit.zdb_id: 1500326-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 4 ( 2021-02-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 4 ( 2021-02-25)
    Abstract: The Software plagiarism, which arises the problem of software piracy is a growing major concern nowadays. It is a serious risk to the software industry that gives huge economic damages every year. The customers may develop a modified version of the original software in other types of programming languages. Furthermore, the plagiarism detection in different types of source codes is a challenging task because each source code may have specific syntax rules. In this paper, we proposed a methodology for software plagiarism detection in multiprogramming languages based on machine learning approaches. The Principal Component Analysis (PCA) is applied for features extraction from source codes without losing the actual information. It extracts features by factor analysis and converts the dataset into normalized linear principal components which are further useful for predictions analysis. Then, the multinomial logistic regression model (MLR) is applied to these components to classify the source codes documents based on predictions. It gives the generalization of logistic regression to handle multiclass problems. Further, the predictors' performance in MLR is evaluated by 2 tailed z test. To apply the experiment, the dataset is collected in five different and popular languages, ie, C, C++, Java, C#, and Python. Each programming language taken in two different case studies, ie, binary search and Stack.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2023
    In:  The Computer Journal Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    In: The Computer Journal, Oxford University Press (OUP), Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    Abstract: Completing the classification of tactics and techniques in cyber threat intelligence (CTI) is an important way to obtain tactics, techniques and procedures (TTPs) and portray the behavior of cyber attacks. However, the high level of abstraction of tactics and techniques information and their presence in CTI, usually in the form of natural language text, make it difficult for traditional manual analysis methods and feature engineering-based machine learning methods to complete the classification of tactics and techniques effectively. Meanwhile, flat deep learning methods do not perform well in classifying more fine-grained techniques due to their inability to exploit the hierarchical relationship between tactics and techniques. Therefore, this paper regards the tactics and techniques of TTPs defined in Adversarial Tactics, Techniques and Common Knowledge knowledge base as labels and proposes a Convolutional Neural Network (CNN) model based on hierarchical knowledge migration and attention mechanism for classifying tactics and techniques in CTI, named HM-ACNN (CNN based on hierarchical knowledge migration and attention mechanism). HM-ACNN classifies tactics and techniques into two phases, and the underlying network model for both phases is the Attention-based CNN network. The first step in HM-ACNN is converting the CTI text into a two-dimensional image based on the word embedding model, and then start training the classification of tactics through the CNN structure based on the attention mechanism before the classification of techniques. Secondly, after the tactics classification training is completed, the tactic-to-technique knowledge migration is then completed by transforming the parameters of the CNN layer and the attention layer in the tactics classification process based on the special hierarchical relationship between tactics and techniques. Then, the classification of techniques is finished by fine-tuning. The experimental results show that HM-ACNN performs well in the tactics and techniques classification tasks, and the metric F1 values reach 93.66% and 86.29%, which are better than other models such as CNN, Recurrent Neural Network and CRNN (Recurrent Convolutional Neural Networks).
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2023
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2018
    In:  Computer Vol. 51, No. 12 ( 2018-12), p. 42-49
    In: Computer, Institute of Electrical and Electronics Engineers (IEEE), Vol. 51, No. 12 ( 2018-12), p. 42-49
    Type of Medium: Online Resource
    ISSN: 0018-9162 , 1558-0814
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2018
    detail.hit.zdb_id: 121237-0
    detail.hit.zdb_id: 2004656-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2018
    In:  The Computer Journal Vol. 61, No. 8 ( 2018-08-01), p. 1202-1215
    In: The Computer Journal, Oxford University Press (OUP), Vol. 61, No. 8 ( 2018-08-01), p. 1202-1215
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2018
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2022
    In:  The Computer Journal ( 2022-11-29)
    In: The Computer Journal, Oxford University Press (OUP), ( 2022-11-29)
    Abstract: Identification and extraction of Tactics, Techniques and Procedures (TTPs) for Cyber Threat Intelligence (CTI) restore the full picture of cyber attacks and guide the analysts to assess the system risk. Existing frameworks can hardly provide uniform and complete processing mechanisms for TTPs information extraction without adequate knowledge background. A multi-instance learning approach named SeqMask is proposed in this paper as a solution. SeqMask extracts behavior keywords from CTI evaluated by the semantic impact, and predicts TTPs labels by conditional probabilities. Still, the framework has two mechanisms to determine the validity of keywords. One using expert experience verification. The other verifies the distortion of the classification effect by blocking existing keywords. In the experiments, SeqMask reached 86.07% and 73.99% in F1 scores for TTPs classifications. For the top 20% of keywords, the expert approval rating is 92.20%, where the average repetition of keywords whose scores between 100% and 90% is 60.02%. Particularly, when the top 65% of the keywords were blocked, the F1 decreased to about 50%; when removing the top 50%, the F1 was under 31%. Further, we also validate the possibility of extracting TTPs from full-size CTI and malware whose F1 are improved by 2.16% and 0.81%.
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2022
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 11 ( 2021-06-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 11 ( 2021-06-10)
    Abstract: Speech emotion recognition is an important technique for human‐computer interface applications. Due to contain rich information of emotion, the spectral feature is widely used for emotion recognition. However, the recognition performance is limited because of imprecise extracted rule and uncertain size of resolution of spectral feature. To address this issue, motivated by speech coding, we introduced psychoacoustics model, provided a perception spectral subband partition method for obtaining more precise frequency resolution. Moreover, we also provided a new spectral feature on the divided subband frequency signals. The proposed feature includes emotional perception entropy, spectral inclination, and spectral flatness. Then, a Support Vector Machine classifier is used to recognize emotion categories. The experiment results show that the proposed spectral feature is superior to the traditional MFCC feature, and also better than the state‐of‐the‐art Fourier feature and multi‐resolution amplitude feature.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...