Zobrazeno 1 - 10
of 2 686
pro vyhledávání: '"Shar A"'
Autor:
Jehad A. Aldali, Shar A. Alahmari, Abeer O. AlMezyed, Nawal S.D. Alshammari, Emadeldin M. Elsokkary
Publikováno v:
Journal of Pure and Applied Microbiology, Vol 17, Iss 3, Pp 1836-1845 (2023)
The study reveals crucial information on S. capitis, a potentially dangerous bacterium that can cause sepsis in hospitalized adult patients, including its frequency and patterns of drug resistance which could significantly contribute to the existing
Externí odkaz:
https://doaj.org/article/a437d1d5c89c46b8bca5ebd4d67e8b0d
Autor:
Schultz, John, Adamek, Jakub, Jusup, Matej, Lanctot, Marc, Kaisers, Michael, Perrin, Sarah, Hennes, Daniel, Shar, Jeremy, Lewis, Cannada, Ruoss, Anian, Zahavy, Tom, Veličković, Petar, Prince, Laurel, Singh, Satinder, Malmi, Eric, Tomašev, Nenad
While large language models perform well on a range of complex tasks (e.g., text generation, question answering, summarization), robust multi-step planning and reasoning remains a considerable challenge for them. In this paper we show that search-bas
Externí odkaz:
http://arxiv.org/abs/2412.12119
Cybersecurity threats in automotive systems pose significant risks to safety and reliability. This article introduces a methodology integrating threat-informed dynamic security modelling with a Threat Analysis and Risk Assessment workflow. Using the
Externí odkaz:
http://arxiv.org/abs/2412.00416
Autor:
Li, Yikun, Zhang, Ting, Widyasari, Ratnadira, Tun, Yan Naing, Nguyen, Huu Hung, Bui, Tan, Irsan, Ivana Clairine, Cheng, Yiran, Lan, Xiang, Ang, Han Wei, Liauw, Frank, Weyssow, Martin, Kang, Hong Jin, Ouh, Eng Lieh, Shar, Lwin Khin, Lo, David
Accurate identification of software vulnerabilities is crucial for system integrity. Vulnerability datasets, often derived from the National Vulnerability Database (NVD) or directly from GitHub, are essential for training machine learning models to d
Externí odkaz:
http://arxiv.org/abs/2411.17274
Autor:
Shar Abdul Majeed, Mahesar Aftab Ahmed, Abbasi Ghazanfer Raza, Narejo Asad Ali, Hakro Asghar Ali Alias Daahar
Publikováno v:
Open Geosciences, Vol 13, Iss 1, Pp 517-531 (2021)
Nari Formation is considered as one of the most important oil and gas exploration targets. These fine-grained tight sandstone reservoirs face enormous challenges due to their extremely low matrix porosity and permeability. Hence, in this regard, the
Externí odkaz:
https://doaj.org/article/37a0b12211ab45d69527bd2983b1fb4b
Autor:
Cheng, Yiran, Shar, Lwin Khin, Zhang, Ting, Yang, Shouguo, Dong, Chaopeng, Lo, David, Lv, Shichao, Shi, Zhiqiang, Sun, Limin
Open-source software (OSS) has experienced a surge in popularity, attributed to its collaborative development model and cost-effective nature. However, the adoption of specific software versions in development projects may introduce security risks wh
Externí odkaz:
http://arxiv.org/abs/2408.07321
In the rapidly evolving realm of artificial intelligence, deploying large language models (LLMs) poses increasingly pressing computational and environmental challenges. This paper introduces MELODI - Monitoring Energy Levels and Optimization for Data
Externí odkaz:
http://arxiv.org/abs/2407.16893
Cyber-physical systems (CPS) are at the intersection of digital technology and engineering domains, rendering them high-value targets of sophisticated and well-funded cybersecurity threat actors. Prominent cybersecurity attacks on CPS have brought at
Externí odkaz:
http://arxiv.org/abs/2404.07527
Autor:
Fan, Jiani, Xu, Minrui, Guo, Jiale, Shar, Lwin Khin, Kang, Jiawen, Niyato, Dusit, Lam, Kwok-Yan
Publikováno v:
IEEE Transactions on Vehicular Technology (Volume: 73, Issue: 3, March 2024)
The Internet of Vehicles (IoV) has great potential to transform transportation systems by enhancing road safety, reducing traffic congestion, and improving user experience through onboard infotainment applications. Decentralized data sharing can impr
Externí odkaz:
http://arxiv.org/abs/2403.20218
This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication techno
Externí odkaz:
http://arxiv.org/abs/2403.20136