The ATT&CK MITRE framework serves as an expansive repository of adversary tactics, techniques, and procedures. Given the sheer volume of these intricate attack patterns, the conventional manual navigation method p...
详细信息
Education sector has witnessed several changes in the recent *** changes have forced private universities into fierce competition with each other to get more students *** competition has resulted in the adoption of ma...
详细信息
Education sector has witnessed several changes in the recent *** changes have forced private universities into fierce competition with each other to get more students *** competition has resulted in the adoption of marketing practices by private universities similar to commercial *** get competitive gain,universities must observe and examine the students’feedback on their own social media sites along with the social media sites of their *** study presents a novel framework which integrates numerous analytical approaches including statistical analysis,sentiment analysis,and text mining to accomplish a competitive analysis of social media sites of the *** techniques enable local universities to utilize social media for the identification of the most-discussed topics by students as well as based on the most unfavorable comments received,major areas for improvement.A comprehensive case study was conducted utilizing the proposed framework for competitive analysis of few top ranked international universities as well as local private universities in Lahore *** results show that diversity of shared content,frequency of posts,and schedule of updates,are the key areas for improvement for the local *** on the competitive intelligence gained several recommendations are included in this paper that would enable local universities generally and Riphah international university(RIU)Lahore specifically to promote their brand and increase their attractiveness for potential students using social media and launch successful marketing campaigns targeting a large number of audiences at significantly reduced cost resulting in an increased number of enrolments.
With the development of cloud computing and Internet technologies, the number of Web services has increased dramatically. It is increasingly difficult for users to locate applicable services among a large number of fu...
详细信息
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s...
详细信息
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algor...
详细信息
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algorithms and applications can be applied in blockchain now,such as[3].
In this work, we propose a Multi-authority (t, n) Threshold Identity-based Matchmaking Encryption (MAT-IBME) scheme under the standard assumptions in the standard model, in which multiple authorities share the secrets...
详细信息
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-...
详细信息
software is said to be secure if it has been developed and designed with security as its top priority. This entails implementing secure coding practices, performing vulnerability testing and repair, as well as continu...
详细信息
The breadth-first search (BFS) algorithm is a fundamental algorithm in graph theory, and it’s parallelization can significantly improve performance. Therefore, there have been numerous efforts to leverage the powerfu...
详细信息
Fog computing is a cutting-edge distributed computing architecture that optimizes resource allocation by fully utilizing the resources within the computing network. However, data security is a major concern in fog com...
详细信息
暂无评论