نتایج جستجو برای: پروژههای bot
تعداد نتایج: 2877 فیلتر نتایج به سال:
در این مقاله، یک مدل بهینه سازی جهت انتخاب بهترین سبد پروژه از بین پروژههای موجود، بهترین سطحاستخدام منابع، سپس زمانبندی پروژههای انتخاب شده جهت بیشینه کردن ارزش خالص فعلی با رعایتمحدودیتها ارائه شده است. چون مدل توسعه یافته در زمره مسایل سخت از نظر محاسباتی قرار دارد، لذا برایحل این مساله یک الگوریتم فراابتکاری بر مبنای الگوریتم ژنتیک پیشنهاد شده است. در الگوریتم حلپیشنهادی علاوه بر کاربرد عمل...
Correlated or synchronized bots commonly exist in social media sites such as Twitter. Bots work towards gaining human followers, participating in campaigns, and engaging in unethical activities such as spamming and false click generation. In this paper, we perform temporal pattern mining on bot activities in Twitter. We discover motifs (repeating behavior), discords (anomalous behavior), joins,...
Data deletion increases challenges in cybercrime investigation. To address the problem, proactive forensics for evidentiary collection is acknowledged to help investigators acquire potentially needed digital evidence. This study proposes a bot machine record data from Discord server advance, hashing and saving it proper storage further forensic analysis. The recording process can be managed col...
BACKGROUND Approximately one-third of all borderline ovarian tumours (BOT) are diagnosed in patients with child-bearing potential. Detailed information regarding their specific characteristics and prognostic factors is limited. METHODS Clinical parameters of BOT patients treated between 1998 and 2008 in 24 German centres were retrospectively investigated. Central pathology review and prospect...
Swarm intelligence is the discipline that deals with natural and artificial systems composed of many individuals that coordinate using decentralized control and self-organization. The discipline focuses on the collective behaviors that result from the local interactions of the individuals with each other and with their environment. Examples of systems studied by swarm intelligence are colonies ...
A distinguishing characteristic of bots is their ability to establish a command and control (C&C) channel. The typical approach to build detection models for C&C traffic and to identify C&C endpoints (IP addresses and domains of C&C servers) is to execute a bot in a controlled environment and monitor its outgoing network connections. Using the bot traffic, one can then craft signatures that mat...
The scheduling and execution of bag-of-tasks applications (BoTs) in Clouds is performed on sets of virtualized Cloud resources that start being exhausted right after their allocation disregarding whether tasks are being executed. In addition, BoTs may be executed in potentially heterogeneous sets of Cloud resources, which may be either previously allocated for a different and fixed number of ho...
The rich functionality of modern personal computers combined with ineffective deployment of practical security solutions opens the door to a wide variety of attacks and exploits on their applications. This in turn has led to an extremely widespread propagation of malware, or software designed to perform hostile activities without the owner’s consent. An increasingly common phenomenon is for mal...
Internet bots have been widely used for various beneficial and malicious activities on the web. In this paper we provide new insights into a new kind of bot termed as web spambot which is primarily used for spreading spam content on the web. To gain insights into web spambots, we developed a tool (HoneySpam 2.0) to track their behaviour. This paper presents two main contributions, firstly it de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید