Computer Sciences

Using deep learning to localize human eyes in images

A team of researchers at China University of Geosciences and Wuhan WXYZ Technologies in China has recently proposed a new machine learning-based technique to locate people's eyes in images of their faces. This technique, ...

Computer Sciences

A model to determine the impact of DDoS attacks using Twitter data

Distributed denial of service (DDoS) attacks, which are designed to prevent legitimate users from accessing specific network systems, have become increasingly common over the past decade or so. These attacks make services ...

Internet

Simulating quantum many-body systems on Amazon Web Services

Quantum many-body systems (QMBs), which are physical systems made up of multiple interacting particles, are among the most challenging structures to reproduce in numerical simulations. In the past, researchers have attempted ...

Consumer & Gadgets

A web application to extract key information from journal articles

Academic papers often contain accounts of new breakthroughs and interesting theories related to a variety of fields. However, most of these articles are written using jargon and technical language that can only be understood ...

Security

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed ...

Computer Sciences

Exploring open-ended evolution in web services

Just like living ecosystems, web services form a complex artificial system consisting of tags and the user-generated media associated with them, such as photographs, movies and web pages. When drawing an analogy between biological ...

Hardware

Plug-and-play bug exposes millions of network devices

A bug in a protocol used by virtually all Internet of Things devices exposes millions of users to potential attack, a researcher reported Monday. The fault centers on the Universal Plug and Play protocol, a 12-year-old implementation ...

page 1 from 36