Currently, the construction of concealed malicious code has become a tre...
In many advanced network analysis applications, like social networks,
e-...
Monitoring kernel object modification of virtual machine is widely used ...
Recently, cybersecurity becomes more and more important due to the rapid...
In recent years, blockchain-based techniques have been widely used in
cy...
Traditional stock market prediction methods commonly only utilize the
hi...
Cloud-assisted Cognitive Internet of Things has powerful data analytics
...
Recent works have shown that social media platforms are able to influenc...