Buscar
Mostrando ítems 1-9 de 9
Different Markov chains modulate visual stimuli processing in a Go-Go experiment in 2D, 3D and augmented reality
(Frontiers Media S.A., 2022)
Acceso abierto
The introduction of Augmented Reality (AR) has attracted several developments, although the people’s experience of AR has not been clearly studied or contrasted with the human experience in 2D and 3D environments. Here, ...
On the relevance of the metadata used in the semantic segmentation of indoor image spaces
(Elsevier, 2021)
Acceso abierto
The study of artificial learning processes in the area of computer vision context has mainly focused on achieving a fixed output target rather than on identifying the underlying processes as a means to develop solutions ...
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications
(Springer, 2021)
Acceso abierto
Internet of Things (IoT) has posed new requirements to the underlying processing architecture, specially for real-time applications, such as event-detection services. Complex Event Processing (CEP) engines provide a powerful ...
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic Professionals, 2020)
Acceso abierto
In the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter
(Science and Information Organization, 2020)
Acceso abierto
Cyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
Heuristics Applied to Mutation Testing in an Impure Functional Programming Language
(Science and Information Organization, 2019)
Acceso abierto
The task of elaborating accurate test suites for program
testing can be an extensive computational work. Mutation
testing is not immune to the problem of being a computational and time-consuming task so that it has found ...