In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity solutions. This paper introduces 'Bluff,' an innovative cybersecurity platform designed to enhance intrusion preventio...
详细信息
The social media of X has become a focal point for discussions on sensitive issues, including the Israeli-Palestinian conflict. This research analyzes sentiment toward tweets expressing support for Palestine on X, com...
详细信息
The accumulation of waste volume in the river waters of DKI Jakarta is still a significant problem that cannot be solved optimally because the population continues to increase every year, so the tonnage of waste also ...
详细信息
Semantic Textual Similarity (STS) plays a critical role in various natural language processing (NLP) applications such as information retrieval, text summarization, and machine translation. This paper presents a compr...
详细信息
The problem of understanding trust relations in modern society is extremely interesting nowadays. In our project, we are going to use Multi-agent systems (MAS) to model and reproduce experiments from social sciences t...
详细信息
In the course of dialogues such as negotiations about what to do, agents take turns to exchange propositions, starting from some initial disagreement and aiming at agreement. It is claimed that propositions are often ...
详细信息
In the era of digital recruitment and increasing volumes of job applications, the effective categorization and classification of resumes have become essential for streamlining the hiring process. The purpose of this p...
详细信息
SQL:1999 recursive queries are almost a quarter century old. In this standard the recursive queries have the form of recursive common table expressions. In recent years vendors of almost all database systems finally i...
详细信息
With the ever-increasing continuous adoption of Industrial Internet of Things(IoT)technologies,security concerns have grown exponentially,especially regarding securing critical *** is primarily due to the potential fo...
详细信息
With the ever-increasing continuous adoption of Industrial Internet of Things(IoT)technologies,security concerns have grown exponentially,especially regarding securing critical *** is primarily due to the potential for backdoors to provide unauthorized access,disrupt operations,and compromise sensitive *** pose a significant threat to the integrity and security of Industrial IoT setups by exploiting vulnerabilities and bypassing standard authentication *** its detection becomes of paramount *** paper not only investigates the capabilities of Machine Learning(ML)models in identifying backdoor malware but also evaluates the impact of balancing the dataset via resampling techniques,including Synthetic Minority Oversampling Technique(SMOTE),Synthetic Data Vault(SDV),and Conditional Tabular Generative Adversarial Network(CTGAN),and feature reduction such as Pearson correlation coefficient,on the performance of the ML *** evaluation on the CCCS-CIC-AndMal-2020 dataset demonstrates that the Random Forest(RF)classifier generated an optimal model with 99.98%accuracy when using a balanced dataset created by ***,the training and testing time was reduced by approximately 50%when switching from the full feature set to a reduced feature set,without significant performance loss.
The deployment of robots as social gamers offer a wide spectrum to test the usability of complex behaviors. Social robots need to commit with social rules and show gaze related behaviors in order to facilitate communi...
详细信息
暂无评论