解脱 发表于 2025-3-25 03:23:13
http://reply.papertrans.cn/48/4726/472520/472520_21.png暂停,间歇 发表于 2025-3-25 08:20:19
Application of an Autonomous Object Behavior Model to Classify the Cybersecurity Statendent methods for assessing the state of autonomous objects were identified. Side channels were described, which enable the monitoring of the state of individual objects. A transition graph was proposed to show the current state of the object based on data from side channels. The type of sound signa使成核 发表于 2025-3-25 11:43:42
Decision Support Based on Human-Machine Collective Intelligence: Major Challengesive feature of the proposed environment is support for natural self-organization processes in the community of participants. Most of the existing approaches for leveraging human expertise in a computing system rely on a pre-defined rigid workflow specification, and those very few systems that try toPalpable 发表于 2025-3-25 16:46:36
FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wallmation that runs through this platform publicly exposes user behaviour and social trends, allowing aggregation of data through conventional intelligence collection techniques such as OSINT (Open Source Intelligence). In this paper, we propose a new method to detect and diagnose variations in overallSupplement 发表于 2025-3-25 21:46:40
Multi-agent Approach to Computational Resource Allocation in Edge Computingallocation in edge computing is offered. On the basis of mathematical model there was developed a multi-agent algorithm as a part of agent-based software architecture for distributed processing of streaming data, which had been developed by the authors previously. The efficiency of the developed algerythema 发表于 2025-3-26 03:51:23
http://reply.papertrans.cn/48/4726/472520/472520_26.pngremission 发表于 2025-3-26 07:39:15
An Approach to the Analysis of the Vehicle Movement on the Organization Territorynd financial applications. In the paper an approach to the analysis of the vehicles routes on the territory of the organization is presented. The vehicle route is reconstructed on the basis of the data from different sources such as access control system, video surveillance and weight measuring deviFlounder 发表于 2025-3-26 11:19:38
http://reply.papertrans.cn/48/4726/472520/472520_28.pngLIMIT 发表于 2025-3-26 15:04:44
Channel Switching Protocols Hinder the Transition to IP World: The Pentagon Storyng from circuit switching to packet switching in telecommunications. Particularly, we analyze the coexistence of circuit switching and packet switching technologies in American military communications where each warfare object should have own IP address. The paper discusses the role of multifunctionCHAR 发表于 2025-3-26 20:42:27
Network Anomaly Detection in Wireless Sensor Networks: A Reviewcal infrastructure. However, the open communications environment of wireless systems, immature technologies and the inherent limitations of sensor nodes make wireless sensor networks an attractive target to malicious activities. The main contributions of this review include describing the true natur