A Novel Exploit Traffic Traceback Method Based on Session Relationship |
Yajing Liu, Ruijie Cai, Xiaokang Yin, Shengli Liu |
Vol 15, No 3 (2023), Pagination: 1-19
|
ABSTRACT |
PDF
|
|
Abstract Views: 91 |
PDF Views: 53
|
Confidential Computing in Edge-Cloud Hierarchy |
Yeghisabet Alaverdyan, Suren Poghosyan, Vahagn Poghosyans |
Vol 15, No 3 (2023), Pagination: 21-30
|
ABSTRACT |
PDF
|
|
Abstract Views: 91 |
PDF Views: 60
|
Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges |
Delali Kwasi Dake |
Vol 15, No 3 (2023), Pagination: 47-62
|
ABSTRACT |
PDF
|
|
Abstract Views: 88 |
PDF Views: 50
|
A PC-Kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate Modeling |
Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao |
Vol 15, No 3 (2023), Pagination: 63-79
|
ABSTRACT |
PDF
|
|
Abstract Views: 91 |
PDF Views: 54
|
Development of a Prototype for Census and Enumeration: A Case Study of Namibia |
Theodora Mukaya, Johanna Nelulu, V Hashiyana, Chris M Mazila |
Vol 15, No 3 (2023), Pagination: 81-95
|
ABSTRACT |
PDF
|
|
Abstract Views: 88 |
PDF Views: 57
|