Skip to main content
    • by 
    •   15  
      PolymorphismTime UseComputer SecurityCryptography
    • by 
    •   9  
      Cognitive ScienceDistributed ComputingRFIDMiddleware
    • by  and +1
    •   7  
      VulnerabilityFirewallResearch PaperThreat
    • by 
    •   5  
      SecurityVulnerabilityHackerExploit
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
    • by 
    •   3  
      Network SecurityPenetration TestingExploit
    • by 
    •   12  
      Network SecurityRisk assessmentVulnerabilityNew Technology
    • by 
    •   6  
      Video GamesSteganographyDigital ForensicsBOT
    • by 
    •   15  
      PolymorphismTime UseComputer SecurityCryptography
    • by 
    •   20  
      VulnerabilityHealthcareHealth Information TechnologyQuality of Care
    • by 
    •   22  
      VulnerabilityHealthcareHealth Information TechnologyQuality of Care
Managing and analyzing a huge number of low-level alerts is very difficult and exhausting for network administrators. Alert correlation methods have been proposed to decrease the number of alerts and make them more intelligible. Proposed... more
    • by 
    •   15  
      EngineeringTechnologyRemote SensingNetwork Security
Technology has impacted businesses in different areas, and, consequently, many companies have found it necessary to make changes in their structures and business models to improve customer satisfaction. The objective was to quantify the... more
    • by 
    •   7  
      Dynamic CapabilitiesStructural Equation ModelingCustomer SatisfactionAutomotive Industry
One of the key factors that endangers network security is software vulnerabilities. So, increasing growth of vulnerability emergence is a critical challenge in security management. Also, organizations constantly encounter the limited... more
    • by 
    •   8  
      RiskVulnerabilitySecurity MetricsImpact
    • by 
    •   5  
      Computer ScienceReinforcement LearningROBOTBasketball
    • by 
    •   6  
      Computer ScienceArtificial IntelligenceMachine LearningForgetting
    • by 
    •   5  
      Computer ScienceDistributed ComputingReinforcement LearningOrchestration
A monitor is a widely-used concurrent programming abstraction that encapsulates all shared state between threads. Monitors can be classified as being either implicit or explicit depending on the primitives they provide. Implicit monitors... more
    • by 
    •   6  
      Computer ScienceDistributed ComputingAbstractionSemantics (Computer Science)
ABSTRACT Workplace learning is complex in form. It is explorative, social and creative enquiry, and because it is carried out in the socio‐political domain of the workplace, it is potentially exploitative of all who contribute. This paper... more
    • by 
    •   7  
      EthicsEpistemologySocial WorkEducational Research
    • by  and +1
    •   22  
      VulnerabilityHealthcareHealth Information TechnologyQuality of Care
    • by 
    •   7  
      Intrusion DetectionPrediction errorVirtual NetworksSimulation Study