Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Pablo Moriano"'
Autor:
Andy Berres, Pablo Moriano, Haowen Xu, Sarah Tennille, Lee Smith, Jonathan Storey, Jibonananda Sanyal
Publikováno v:
Data in Brief, Vol 55, Iss , Pp 110675- (2024)
This publication presents an annotated accident dataset which fuses traffic data from radar detection sensors, weather condition data, and light condition data with traffic accident data (as illustrated in Fig. 1) in a format that is easy to process
Externí odkaz:
https://doaj.org/article/bacf07d820fe42029f70c8ab353f4366
Autor:
Miki E Verma, Robert A Bridges, Michael D Iannacone, Samuel C Hollifield, Pablo Moriano, Steven C Hespeler, Bill Kay, Frank L Combs
Publikováno v:
PLoS ONE, Vol 19, Iss 1, p e0296879 (2024)
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions or anomalies on CANs. Prod
Externí odkaz:
https://doaj.org/article/ddd94838251c439ca697993e9312f0e5
Autor:
Jonathan Bryan, Pablo Moriano
Publikováno v:
PLoS ONE, Vol 18, Iss 4, p e0284077 (2023)
The increasing complexity of today's software requires the contribution of thousands of developers. This complex collaboration structure makes developers more likely to introduce defect-prone changes that lead to software faults. Determining when the
Externí odkaz:
https://doaj.org/article/eaa94a745ffc438db87d655b1fc573ba
Publikováno v:
Scientific Reports, Vol 9, Iss 1, Pp 1-9 (2019)
Scientific Reports
Scientific Reports
We propose a method for detecting large events based on the structure of temporal communication networks. Our method is motivated by findings that viral information spreading has distinct diffusion patterns with respect to community structure. Namely
Publikováno v:
Computers & Security. 70:319-334
Routing anomalies, beyond simple leaks, are occurring on the order of tens of thousands a year. These may be accidents, but there is anecdotal evidence that indicates criminal intent. There are case studies that illustrate the use of these for nation
Publikováno v:
Information & Computer Security. 25:190-205
Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, external
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c6ea8a4454deacf92e7e1bf2dfa898e9
http://arxiv.org/abs/1905.05835
http://arxiv.org/abs/1905.05835
Publikováno v:
MIST@CCS
Detection of insider threats relies on monitoring individuals and their interactions with organizational resources. Identification of anomalous insiders typically relies on supervised learning models that use labeled data. However, such labeled data
Autor:
Jorge Finke, Pablo Moriano
Publikováno v:
CDC
People share opinions, exchange information, and trade services on large, interconnected platforms. As with many new technologies these platforms bring with them new vulnerabilities, often becoming targets for fraudsters who try to deceive randomly s
Autor:
Jorge Finke, Pablo Moriano
Publikováno v:
ACC
Scopus-Elsevier
Scopus-Elsevier
Based on the formation of triad junctions, the proposed mechanism generates growing networks that exhibit extended power law behavior and strong neighborhood clustering. The asymptotic behavior of both properties is of interest in the study of networ