Abstract: The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity ...
This paper addresses carrier aircraft landing scheduling considering bolting and aerial refueling. It defines fuel and wake ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
Abstract: A precise change detection in the multi-temporal optical images is considered as a crucial task. Although a variety of machine learning-based change detection algorithms have been proposed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results