Search
Now showing items 1-4 of 4
A survey of modern deep learning based object detection models
(Elsevier, 2022-06-30)
Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep ...
SoK: context and risk aware access control for zero trust systems
(Wiley/Hindawi, 2022-06-30)
Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex,
dispersed, and dynamic enterprise operational environment. New security enterprise architectures ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...
ECE: Exactly-Once-Computation for Collaborative Edge in IoT using Information Centric Networking
(IEEE, 2023-05-11)
—Exactly-once data processing/delivery can be
guaranteed in traditional big data processing systems, e.g.
Apache Flink. Checkpoint is commonly used as the solution.
Each operator in these systems can restart from the ...