A Novel Exploit Traffic Traceback Method Based on Session Relationship |
Yajing Liu, Ruijie Cai, Xiaokang Yin, Shengli Liu |
Vol 15, No 3 (2023), Pagination: 1-19
|
ABSTRACT |
PDF
|
|
Abstract Views: 225 |
PDF Views: 123
|
Confidential Computing in Edge-Cloud Hierarchy |
Yeghisabet Alaverdyan, Suren Poghosyan, Vahagn Poghosyans |
Vol 15, No 3 (2023), Pagination: 21-30
|
ABSTRACT |
PDF
|
|
Abstract Views: 211 |
PDF Views: 127
|
Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges |
Delali Kwasi Dake |
Vol 15, No 3 (2023), Pagination: 47-62
|
ABSTRACT |
PDF
|
|
Abstract Views: 216 |
PDF Views: 113
|
A PC-Kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate Modeling |
Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao |
Vol 15, No 3 (2023), Pagination: 63-79
|
ABSTRACT |
PDF
|
|
Abstract Views: 280 |
PDF Views: 143
|
Development of a Prototype for Census and Enumeration: A Case Study of Namibia |
Theodora Mukaya, Johanna Nelulu, V Hashiyana, Chris M Mazila |
Vol 15, No 3 (2023), Pagination: 81-95
|
ABSTRACT |
PDF
|
|
Abstract Views: 206 |
PDF Views: 122
|