Topic Review
Addressing ZSM Security Issues with Blockchain Technology
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ultra-low latency, high availability and wide service coverage can be met across the network regardless of the network infrastructure ownership. Blockchain technology inherently addresses security in trustless environments such as the infrastructures defined by the Zero-touch Service Management (ZSM) team.
  • 269
  • 19 Jan 2024
Topic Review
ADM-3A
The ADM-3A was an influential early video display terminal, introduced in 1976. It was manufactured by Lear Siegler and had a 12-inch screen displaying 12 or 24 lines of 80 characters. It set a new industry low single unit price of $995. Its "dumb terminal" nickname came from some of the original trade publication advertisements. It quickly became commercially successful because of the rapid increase of computer communications speeds, and because of new minicomputer systems released to the market which required inexpensive operator consoles.
  • 1.1K
  • 29 Nov 2022
Topic Review
Adobe Photoshop Version History
This table shows the Adobe Photoshop version history and operating system compatibility in charts, starting with the first versions by independent creators and brothers Thomas and John Knoll in the summer of 1988. The license to distribute the program was purchased by Adobe Systems in September 1988.
  • 759
  • 11 Oct 2022
Topic Review
Advanced Agriculture Technology
The agricultural industry is getting more data-centric and requires precise, more advanced data and technologies than before, despite being familiar with agricultural processes. The agriculture industry is being advanced in generating database by various information and advanced communication technologies, such as the Internet of Things (IoT). 
  • 7.4K
  • 25 May 2021
Topic Review
Advanced Machine Learning
This entry provides a comprehensive state-of-the-art investigation of the recent advances in data science in emerging economic applications. The analysis is performed on the novel data science methods in four individual classes of deep learning models, hybrid deep learning models, hybrid machine learning, and ensemble models. Application domains include a broad and diverse range of economics research from the stock market, marketing, and e-commerce to corporate banking and cryptocurrency. Prisma method, a systematic literature review methodology, is used to ensure the quality of the survey. The findings reveal that the trends follow the advancement of hybrid models, which outperform other learning algorithms. It is further expected that the trends will converge toward the evolution of sophisticated hybrid deep learning models.
  • 1.4K
  • 25 Dec 2021
Topic Review
Advanced Persistent Thread and Common Systems Behavioral Sources
The rapid proliferation of Internet of Things (IoT) networks in Colombia and various global regions has unquestionably resulted in a significant increase in cyberattacks. This rapid expansion of interconnected devices carries significant implications for individuals, organizations, and governing entities.
  • 515
  • 08 Mar 2024
Topic Review
Advanced Persistent Threat Predictive Analytics
Advanced persistent threat (APT) audit logs information and uses a combination of causal graphs and deep learning techniques to perform predictive analysis of APT.
  • 201
  • 28 Dec 2023
Topic Review
Advanced Persistent Threats Detection for Mobile Devices
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks.
  • 340
  • 12 Oct 2023
Topic Review
Advanced Security Framework for Internet of Things
Due to the massive accessibility and interconnection of IoT devices, systems are at risk of being exploited by hackers. Therefore, there is a need to find an advanced security framework that covers data security, data confidentiality, and data integrity issues. 
  • 691
  • 04 Jul 2022
Topic Review
Advancements and Challenges in Handwritten Text Recognition
Handwritten Text Recognition (HTR) involves automatically transforming a source’s handwritten text within a digital image into its machine text representation.
  • 689
  • 07 Mar 2024
  • Page
  • of
  • 371
ScholarVision Creations