Zobrazeno 1 - 10
of 1 010
pro vyhledávání: '"Sadoc, A."'
This paper presents an approach to managing access to Content Delivery Networks (CDNs), focusing on combating the misuse of tokens through performance analysis and statistical access patterns. In particular, we explore the impact of token sharing on
Externí odkaz:
http://arxiv.org/abs/2410.05642
Autor:
Patel, Kajal, Shafiq, Zubair, Nogueira, Mateus, Menasché, Daniel Sadoc, Lovat, Enrico, Kashif, Taimur, Woiwood, Ashton, Martins, Matheus
Many organizations rely on Threat Intelligence (TI) feeds to assess the risk associated with security threats. Due to the volume and heterogeneity of data, it is prohibitive to manually analyze the threat information available in different loosely st
Externí odkaz:
http://arxiv.org/abs/2409.07709
Autor:
Eshwar, S. R., Felipe, Lucas Lopes, Reiffers-Masson, Alexandre, Menasché, Daniel Sadoc, Thoppe, Gugan
Load balancing and auto scaling are at the core of scalable, contemporary systems, addressing dynamic resource allocation and service rate adjustments in response to workload changes. This paper introduces a novel model and algorithms for tuning load
Externí odkaz:
http://arxiv.org/abs/2406.14141
Autor:
Moreno-Vera, Felipe, Nogueira, Mateus, Figueiredo, Cainã, Menasché, Daniel Sadoc, Bicudo, Miguel, Woiwood, Ashton, Lovat, Enrico, Kocheturov, Anton, de Aguiar, Leandro Pfleger
This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums. The increasing volume of posts discussing exploitation in the wild calls for an automatic ap
Externí odkaz:
http://arxiv.org/abs/2308.02581
Indicators of Compromise (IOCs), such as IP addresses, file hashes, and domain names associated with known malware or attacks, are cornerstones of cybersecurity, serving to identify malicious activity on a network. In this work, we leverage real data
Externí odkaz:
http://arxiv.org/abs/2307.16852
A grid method using tiling by fundamental domain of simple 2D lattices is presented. It refer to a previous work done by Stampfli in $1986$ using two tilings by regular hexagons, one rotate by $\pi/2$ relatively to the other. This allows to get a qua
Externí odkaz:
http://arxiv.org/abs/2307.10118
Similarity caching allows requests for an item \(i\) to be served by a similar item \(i'\). Applications include recommendation systems, multimedia retrieval, and machine learning. Recently, many similarity caching policies have been proposed, but st
Externí odkaz:
http://arxiv.org/abs/2209.03174
Autor:
Modina, Naresh, El-Azouzi, Rachid, De Pellegrini, Francesco, Menasche, Daniel Sadoc, Figueiredo, Rosa
The widespread adoption of 5G cellular technology will evolve as one of the major drivers for the growth of IoT-based applications. In this paper, we consider a Service Provider (SP) that launches a smart city service based on IoT data readings: in o
Externí odkaz:
http://arxiv.org/abs/2201.07615
We highlight changes to cell signalling under virus invasion (SARS-CoV-2), involving disturbance of membranes and of nanodomains, modulated by the cytoskeleton. Virus alters the mechanical properties of the membranes, impairing mesophase structures m
Externí odkaz:
http://arxiv.org/abs/2107.07492
Publikováno v:
Symposium on Cryptocurrency Analysis (SOCCA) 2020
Blockchains and cryptocurrencies disrupted the conversion of energy into a medium of exchange. Numerous applications for blockchains and cryptocurrencies are now envisioned for purposes ranging from inventory control to banking applications. Naturall
Externí odkaz:
http://arxiv.org/abs/2101.00845