Intelligent surfaces for 6G wireless networks: A survey of optimization and performance analysis techniques

R Alghamdi, R Alhadrami, D Alhothali, H Almorad… - IEEE …, 2020 - ieeexplore.ieee.org
This paper surveys the optimization frameworks and performance analysis methods for large
intelligent surfaces (LIS), which have been emerging as strong candidates to support the …

Voltage and current measuring technologies for high voltage direct current supergrids: A technology review identifying the options for protection, fault location and …

D Tzelepis, V Psaras, E Tsotsopoulou… - IEEE …, 2020 - ieeexplore.ieee.org
After the occurrence of a DC-side feeder faults on HVDC transmission systems, protection
and fault detection systems are anticipated to minimize their onerous effects, by initiating …

A novel approach for code smells detection based on deep leaning

T Lin, X Fu, F Chen, L Li - … in Computer and Communications: First EAI …, 2021 - Springer
Compared to software bugs, code smells are more significant in software engineering
research. It is not easy to detect code smells through traditional methods. In this work, we …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

Deep learning for IoT

T Lin - 2020 IEEE 39th International Performance Computing …, 2020 - ieeexplore.ieee.org
Deep learning and other machine learning approaches are deployed to many systems
related to Internet of Things or IoT. However, it faces challenges that adversaries can take …

99% false positives: A qualitative study of {SOC} analysts' perspectives on security alarms

BA Alahmadi, L Axon, I Martinovic - 31st USENIX Security Symposium …, 2022 - usenix.org
In this work, we focus on the prevalence of False Positive (FP) alarms produced by security
tools, and Security Operation Centers (SOCs) practitioners' perception of their quality. In an …

Overview of the multiview and 3D extensions of high efficiency video coding

G Tech, Y Chen, K Müller, JR Ohm… - … on Circuits and …, 2015 - ieeexplore.ieee.org
The High Efficiency Video Coding (HEVC) standard has recently been extended to support
efficient representation of multiview video and depth-based 3D video formats. The multiview …

Traffic engineering in software-defined networking: Measurement and management

Z Shu, J Wan, J Lin, S Wang, D Li, S Rho… - IEEE access, 2016 - ieeexplore.ieee.org
As the next generation network architecture, software-defined networking (SDN) has exciting
application prospects. Its core idea is to separate the forwarding layer and control layer of …

A Data Triage Retrieval System for Cyber Security Operations Center

T Lin - 2018 - etda.libraries.psu.edu
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …

Matched and mismatched SOCs: A qualitative study on security operations center issues

FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili… - Proceedings of the …, 2019 - dl.acm.org
Organizations, such as companies and governments, created Security Operations Centers
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …