Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Jesus, Solano"'
A study of four different machine learning (ML) algorithms is performed to determine the most suitable ML technique to disentangle a hypothetical supersymmetry signal from its corresponding Standard Model (SM) backgrounds and to establish their impac
Externí odkaz:
http://arxiv.org/abs/2106.06813
Autor:
Alex Mauri Tello López, Ivonir Piotrowski, José Mauro Santana da Silva, Manuela de Jesus Solano Calvo, Fátima Conceição Marquez Piña-Rodrigues
Publikováno v:
Floresta e Ambiente, Vol 26, Iss 4 (2019)
ABSTRACT The homegardens result from collective learning and fulfill environmental services, contributing to the agrobiodiversity conservation and food security. The present study analyzed whether legal mechanisms incorporate concepts on environmenta
Externí odkaz:
https://doaj.org/article/d7042cf200464c18a653c7fe08074c9d
Publikováno v:
International Journal of Modern Physics A. 37
In this paper, a study of four different machine learning (ML) algorithms is performed to determine the most suitable ML technique to disentangle a hypothetical supersymmetry (SUSY) signal from its corresponding Standard Model (SM) backgrounds and to
Publikováno v:
Agricultural Finance Review. 80:589-608
PurposeIn the equatorial Pacific, rainfall is affected by global climate phenomena, such as El Niño Southern Oscillation (ENSO). However, current publicly available methodologies for valuing weather derivatives do not account for the influence of EN
Autor:
Luis David Camacho, Claudio Deiro, Martín Ochoa, Javier Vargas, Jesus Solano, Alejandro Correa
Publikováno v:
International Journal of Information Security. 20:181-197
The fragility of password-based authentication has been recognized and studied for several decades. It is an increasingly common industry practice to profile users based on their sessions context, such as IP ranges and Browser type in order to build
Autor:
Jesus Solano, Alejandro Correa-Bahnsen, Fernando G. Paulin, David Zarruk-Valencia, Sebastian Soriano Perez, Jaime D. Acevedo-Viloria
Identity theft is a major problem for credit lenders when there's not enough data to corroborate a customer's identity. Among super-apps large digital platforms that encompass many different services this problem is even more relevant; losing a clien
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3ae016fe8d47fde5d68ae2e5f4f03837
http://arxiv.org/abs/2111.03707
http://arxiv.org/abs/2111.03707
Autor:
Chen Yeh, Jessica K. Johnson, Aria Degillio, Melissa Segovia, Jesus Solano-Martinez, Alicia Diebold, Dana Zakieh, Jackie K. Gollan, Jody D. Ciolino, S. Darius Tandon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::48ecd90893fcef60110e070cd09541d3
https://doi.org/10.25302/03.2021.ad-1507-31473
https://doi.org/10.25302/03.2021.ad-1507-31473
Autor:
Christian Lopez, Alejandra Castelblanco, Martín Ochoa, Lizzy Tengana, Jesus Solano, Esteban Rivera
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030808242
DIMVA
DIMVA
Providing integrity guarantees for websites rendered on a user’s browser is a crucial security property for web applications. There are several ways to tamper with data being received or rendered on the client side, including browser hijacking, mal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f8a730abddbaf772c4138a229ebdc86c
https://doi.org/10.1007/978-3-030-80825-9_19
https://doi.org/10.1007/978-3-030-80825-9_19
Autor:
Christian Lopez, Martín Ochoa, Esteban Rivera, Alejandra Castelblanco, Lizzy Tengana, Jesus Solano
Publikováno v:
AISec@CCS
Impersonation attacks against web authentication servers have been increasing in complexity over the last decade. Tunnelling services, such as VPNs or proxies, can be for instance used to faithfully impersonate victims in foreign countries. In this p
Autor:
Martín Ochoa, Christian Lopez, Esteban Rivera, Lizzy Tengana, Alejandra Castelblanco, Jesus Solano
Publikováno v:
AISec@CCS
Adversarial attacks have gained popularity recently due to their simplicity and impact. Their applicability to diverse security scenarios is however less understood. In particular, in some scenarios, attackers may come up naturally with ad-hoc black-