Zobrazeno 1 - 10
of 6 211
pro vyhledávání: '"A. Shaha"'
Autor:
Rony, Md Rashad Al Hasan, Shaha, Sudipto Kumar, Hasan, Rakib Al, Dey, Sumon Kanti, Rafi, Amzad Hossain, Sirajee, Ashraf Hasan, Lehmann, Jens
Bengali is the seventh most spoken language on earth, yet considered a low-resource language in the field of natural language processing (NLP). Question answering over unstructured text is a challenging NLP task as it requires understanding both ques
Externí odkaz:
http://arxiv.org/abs/2410.10229
Autor:
Nandakumar, Dhruv, Schiller, Robert, Redino, Christopher, Choi, Kevin, Rahman, Abdul, Bowen, Edward, Vucovich, Marc, Nehila, Joe, Weeks, Matthew, Shaha, Aaron
The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale. The diverse nature of normal behavior along with the huge landscape of a
Externí odkaz:
http://arxiv.org/abs/2211.00441
Autor:
Alam, Md. Shaha, Farhad, Syed Farid Uddin, Tanvir, Nazmul Islam, Bitu, Md. Nur Amin, Moniruzzaman, Mohammad, Hakim, Mahmuda, Shaikh, Md Aftab Ali
Raman Spectroscopy offers an in-situ, rapid, and non-destructive characterization tool for chemical analysis of diverse samples with no or minimal preparation. However, due to the inherent weak signal of conventional Raman spectroscopy, surface plasm
Externí odkaz:
http://arxiv.org/abs/2209.09164
Autor:
Kushwaha, Deepak, Nandakumar, Dhruv, Kakkar, Akshay, Gupta, Sanvi, Choi, Kevin, Redino, Christopher, Rahman, Abdul, Chandramohan, Sabthagiri Saravanan, Bowen, Edward, Weeks, Matthew, Shaha, Aaron, Nehila, Joe
Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrus
Externí odkaz:
http://arxiv.org/abs/2208.13524
Autor:
Redino, Christopher, Nandakumar, Dhruv, Schiller, Robert, Choi, Kevin, Rahman, Abdul, Bowen, Edward, Weeks, Matthew, Shaha, Aaron, Nehila, Joe
Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been c
Externí odkaz:
http://arxiv.org/abs/2205.02298
Publikováno v:
In Heliyon 30 November 2024 10(22)
Publikováno v:
In Antiviral Research November 2024 231
Publikováno v:
In Journal of Water Process Engineering November 2024 67
Publikováno v:
In Optics Communications 15 October 2024 569
Autor:
Shaha, Sarthak N., Nangare, Sopan N., Patil, Pravin O., Khan, Zamir G., Bari, Sanjaykumar B., Chaudhari, Nilesh B., Mahajan, Mahendra R.
Publikováno v:
In Microchemical Journal October 2024 205