We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Correct and Efficient Policy Monitoring, a Retrospective

    The MonPoly project started over a decade ago to build effective tools for monitoring trace properties, including functional correctness, security,...
    David Basin, Srđan Krstić, ... Dmitriy Traytel in Automated Technology for Verification and Analysis
    Conference paper 2023
  2. Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

    Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly...

    Armita Kazeminajafabadi, Mahdi Imani in Cybersecurity
    Article Open access 01 September 2023
  3. Monitoring

    The previous two chapters have been concerned principally with what happens to Azure Data Factory resources after you have finished develo** them –...
    Richard Swinbank in Azure Data Factory by Example
    Chapter 2024
  4. TFPsocialmedia: a public dataset for studying Turkish foreign policy

    Objectives

    This data note introduces the TFPsocialmedia dataset, designed to aid social media researchers investigating Turkish Foreign Policy (TFP)....

    Hakan Mehmetcik, Murat Can Ganiz, ... Emre Tortumlu in Discover Data
    Article Open access 02 April 2024
  5. Algorithmic governance and AI: balancing innovation and oversight in Indonesian policy analyst

    The objective of this study is to examine the effects of generative artificial intelligence (AI) tools, with a specific focus on ChatGPT, on the...

    Bevaola Kusumasari, Bernardo Nugroho Yahya in AI & SOCIETY
    Article 01 July 2024
  6. Security Monitoring

    Security monitoring utilizes components that allow you to monitor, control, and manage your Snowflake estate. They are the internal and external...
    Andrew Carruthers, Sahir Ahmed in Maturing the Snowflake Data Cloud
    Chapter 2023
  7. Policy advice and best practices on bias and fairness in AI

    The literature addressing bias and fairness in AI models ( fair-AI ) is growing at a fast pace, making it difficult for novel researchers and...

    Jose M. Alvarez, Alejandra Bringas Colmenarejo, ... Salvatore Ruggieri in Ethics and Information Technology
    Article Open access 29 April 2024
  8. Artificial intelligence unlocks ecological environment governance —smart statistical monitoring based on meteorology

    In recent years, the issue of governance of the ecological environment has been a subject of high of social concern, and the challenges in the...

    Article 18 February 2023
  9. Policy Guidelines for Smart Sanitation Technology as a Public Health Tool

    Smart sanitation technology, or SST, refers to digital technologies applied to the sanitation industry. The breadth of applications can be wide, and...

    Maria Carnovale in Digital Society
    Article 07 March 2024
  10. Automated Security Monitoring

    Security monitoring is the automated process of collecting and analyzing potential security threats and taking appropriate actions to create secure...
    Chapter 2023
  11. Monitoring the Internet Computer

    The Internet Computer (IC) is a distributed platform for Web3 applications, spanning over 1,200 nodes worldwide. We present results on applying...
    David Basin, Daniel Stefan Dietiker, ... Arshavir Ter-Gabrielyan in Formal Methods
    Conference paper 2023
  12. Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches

    Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...

    **anfeng Li, Haoran Sun, Yan Huang in Journal of Network and Systems Management
    Article 18 June 2024
  13. A comprehensive AI policy education framework for university teaching and learning

    This study aims to develop an AI education policy for higher education by examining the perceptions and implications of text generative AI...

    Article Open access 07 July 2023
  14. Electronic Monitoring Systems As Tools for Managing Implementation of Framework CIS Documents

    Abstract

    This work presents the main provisions for studying systems of monitoring the implementation of framework CIS international documents in the...

    S. M. Gonnova, N. A. Chuykova, E. Yu. Razuvaeva in Scientific and Technical Information Processing
    Article 01 March 2024
  15. Regenerating Networked Systems’ Monitoring Traces Using Neural Networks

    Monitoring main entities in distributed systems is important for research, development, and innovation activities involving those systems (offline...

    Kayuã Oleques Paim, Vagner Ereno Quincozes, ... Weverton Cordeiro in Journal of Network and Systems Management
    Article 21 December 2023
  16. Policy Issues

    The application of Artificial Intelligence Cyber defense Agents (or AICA) poses policy challenges to civil and military doctrine- and policy-makers....
    Chapter 2023
  17. Security Policy Learning

    Security Policies define rules aiming to protect the infrastructure from insider and outsider threats. A key component to achieving this goal is...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  18. Re-attentive experience replay in off-policy reinforcement learning

    Experience replay, which stores past samples for reuse, has become a fundamental component of off-policy reinforcement learning. Some pioneering...

    Wei Wei, Da Wang, ... Jiye Liang in Machine Learning
    Article 22 February 2024
  19. Optimizing air quality monitoring device deployment: a strategy to enhance distribution efficiency

    Precise and efficient air quality monitoring is a pivotal step in combating the harmful effects of pollution. Our research addresses the challenges...

    Pritisha Sarkar, Mousumi Saha in International Journal of Information Technology
    Article 12 May 2024
  20. A home energy management approach using decoupling value and policy in reinforcement learning

    Considering the popularity of electric vehicles and the flexibility of household appliances, it is feasible to dispatch energy in home energy systems...

    Luolin **ong, Yang Tang, ... Feng Qian in Frontiers of Information Technology & Electronic Engineering
    Article 10 August 2023
Did you find what you were looking for? Share feedback.