Bangla or Bengali is the national language of Bangladesh, people from different regions don't talk in proper Bangla. Every division of Bangladesh has its own local language like Sylheti, Chittagong etc. In recent ...
详细信息
the proceedings contain 36 papers. the topics discussed include: on detecting malicious code injection by monitoring multi-level container activities;feather: lightweight container alternatives for deploying workloads...
ISBN:
(纸本)9789897587016
the proceedings contain 36 papers. the topics discussed include: on detecting malicious code injection by monitoring multi-level container activities;feather: lightweight container alternatives for deploying workloads in the edge;creek: leveraging serverless for online machine learning on streaming data;tail-latency aware and resource-efficient bin pack autoscaling for distributed event queues;hosting-aware pruning of components in deployment models;load-aware container orchestration on Kubernetes clusters;prediction of resource utilization in cloud computing using machine learning;state-aware application placement in mobile edge clouds;value for money: an experimental comparison of cloud pricing and performance;and pruning modes for deployment models: from manual modeling to automated removal of elements and their implications.
the proceedings contain 33 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: An Approach Based on LLMs for Forensic threat...
ISBN:
(纸本)9783031750151
the proceedings contain 33 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: An Approach Based on LLMs for Forensic threat Detection in Autonomous systems;smart Water Meter Network Anomaly and Failure Detection System;Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA;A Comparison of Frameworks for Heterogeneous computing Using High-Performance Pattern-Matching for DNA Biometrics and Digital Forensics;Fuzzing Robotic Software Using HPC and LLM;performance Impact of Strengthening the Accountability and Explainability System in Autonomous Robots;Generation of Industrial Protocol-Traffic via Enhanced Wasserstein GAN;cyber Security in Hospitals: A Network-Oriented Model for Behavioural Learning of Employees During Phishing Simulations;Augmenting API Security Testing with Automated LLM-Driven Test Generation;Exploring the Use of LLMs to Understand Network Traces;securing V2X Communication: A Hybrid Deep Learning Approach for Misbehavior Detection;Use of GAN Models and CNN Heatmaps in Malware;Evaluating Sniffers, IDS, and IPS: A Systematic Literature Mapping;Performance Analysis of NTT Algorithms;exploring the Landscape of Honeypots in the Fight Against Cyber threats: A Systematic Mapping of Literature;phishing and Spam Prevention Powered by Jetson Nano;decentralized Edge-Based Detection of Label Flipping Attacks in Federated Learning;analysis of Post-Quantum Cryptographic Algorithms: A Systematic Literature Review;A Comparison of AI-Enabled Techniques for the Detection of Attacks in IoT Devices;understanding Malware Dynamics in IoT Networks: Dataset Construction Using Mathematical Epidemiology and Complex Networks;Quality of Service Enhancement for IoT-Based Smart Office System Using Ad Hoc On-Demand Distance Vector-Smart Control Ration Control Algorithm (AODV-SRCA);cyberattack Detector for Real-Time
Functional connectivity is a widely used method to explore the connections among different regions in the brain. However, it is still a challenge to extract structures from multiple similar brain networks that can cha...
详细信息
Electric power enterprises are responsible for power investment, construction, operation, purchase and sales, trading and dispatching, and optimal allocation of power resources. they have huge capital inflows and capi...
详细信息
Advancements in facial recognition technology have sparked significant interest in enhancing the precision of age and gender classification, crucial for applications ranging from personalized advertising to security s...
详细信息
A critical property of distributed data processing systems is the high level of reliability of such systems. A practical solution to this problem is to place copies of archives of magnetic media in the nodes of the sy...
详细信息
APIs or Application Programming Interfaces help distributedsystems and microservices to expose their functionalities and serve as a means for communication among them. In contrast to a poorly designed API, a well-des...
详细信息
In contemporary distributedsystems, logs are produced at an astounding rate, generating terabytes of data within mere seconds. these logs, containing pivotal details like system metrics, user actions, and diverse eve...
详细信息
Multi-cloud environments offer benefits like vendor diversification and resilience but pose challenges such as increased management complexity, lack of cost transparency, and compliance. this concept paper introduces ...
详细信息
暂无评论