Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This study investigates common reasoning limitations in Large Language Models (LLMs) and proposes a targeted prompting strategy to mitigate these issues. I identify several problem types where LLMs consistently fail due to over-reliance... more
    • by 
    •   7  
      Cognitive PsychologyComputer ScienceArtificial IntelligenceMetacognitive Prompts
    • by 
    •   13  
      Information SystemsPsychologyComputer ScienceHacker
    • by 
    •   18  
      Computer ScienceMachine LearningWeb page designComputer Security
Internet of Things (IoT) is an emerging filed for technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined... more
    • by 
    •   6  
      BusinessInternet of ThingsThe InternetHacker
Databases hold a critical concentration of sensitive information and become available on the internet to facilitate access, and as a result, databases are vulnerable and become the target of hackers. Today the security of database system... more
    • by 
    •   7  
      Computer ScienceComputer SecurityHackerDatabase Security
The rapid evolution and widespread use of network-based technologies have ushered in a corresponding surge in cyber-attacks, necessitating more advanced security measures to safeguard against these threats. In response, this study... more
    • by 
    •   7  
      Artificial IntelligenceMachine LearningArtificial Neural NetworksDeep Learning
    • by 
    •   12  
      BusinessComputer ScienceAdvertisingComputer Security
Abstract: We are building a wide area surrogate computing platform, called WASCo, that allows users to dynamically locate, allocate, and exploit resources on surrogate computers spread around the Internet. WASCo allows clients to install... more
    • by 
    •   6  
      EngineeringComputer ScienceComputer SecurityThe Internet
    • by 
    •   11  
      EngineeringHumanitiesCommonsCapitalism
    • by 
    •   20  
      HistoryNeurosciencePsychologyArchaeology
    • by 
    •   17  
      PhilosophyEpistemologyPhilosophy of ScienceHistory of Science
    • by 
    •   9  
      SociologyPhilosophyOntologyEpistemology
    • by 
    •   3  
      SociologyProceedingsHacker
    • by 
    •   17  
      Computer ScienceArtificial IntelligencePhilosophyMachine Learning
    • by 
    •   17  
      BusinessMachine LearningComputer SecurityService Science Management Engineering Design (SSMED)
This article describes and analyzes one of the actions developed in the interinstitutional research linked to the project “School-World Connection: innovative spaces for citizen training”. The problem refers to the violence present within... more
    • by 
    •   4  
      SociologyComputer ScienceComputer SecurityHacker
    • by 
    •   7  
      BusinessThe InternetHackerPopulation
    • by 
    •   7  
      Computer ScienceComputer SecurityCryptographyThe Internet
    • by 
    •   7  
      Computer ScienceMachine LearningDigitizationThe Internet
    • by 
    •   12  
      BusinessMarketingComputer ScienceChemistry
    • by 
    •   20  
      BusinessMarketingPsychologySocial Psychology
In the modern age, the increasing use and exploration of information technology and the internet by hackers has created a new security threat to the integrity and socio-political stability of the Malaysian nation. Malaysia is not only one... more
    • by 
    •   7  
      BusinessTerrorismSovereigntyPolitics
Tiền sản giật là một hội chứng bệnh lý trong thai kỳ, với đặc trưng là huyết áp cao và dư thừa protein niệu sau tuần thai thứ 20. Bà bầu bị tiền sản giật có nguy hiểm không?
    • by 
    •   4  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức Khỏechăm sóc mẹ bầu
    • by 
    •   5  
      Computer ScienceComputer SecurityHackerMalware
    • by 
    •   4  
      DemocracyHackerTriangulationDesk
Indonesia has started implementing e-democracy in the general election process by determining e-KTP as a voter requirement. This paper explored Indonesia’s efforts to develop e-democracy. Qualitative methods were used by applying desk... more
    • by 
    •   4  
      DemocracyHackerTriangulationDesk
On Thursday, September 15th, 2022, Uber, an American multinational ride-share company, confirmed reports of an organization-wide cybersecurity breach. This concerns how an (allegedly) 18-year-old attacker could hack the ridesharing... more
    • by 
    •   5  
      Social EngineeringCredentialsPAMETUber drivers
    • by 
    •   2  
      Computer ScienceHacker
On Thursday, September 15th, 2022, Uber, an American multinational ride-share company, confirmed reports of an organization-wide cybersecurity breach. This concerns how an (allegedly) 18-year-old attacker could hack the ridesharing... more
    • by 
    •   4  
      PamphyliaSocial EngineeringUber driversIjcet Iaeme
    • by 
    •   4  
      Computer ScienceEpistemologyHackerReading Process
    • by 
    •   7  
      Computer ScienceMachine LearningDigitizationThe Internet
    • by 
    •   20  
      BusinessMarketingFinanceComputer Science
    • by 
    •   16  
      GeologyGeochemistryComputer ScienceArtificial Intelligence
    • by 
    •   7  
      Computer ScienceAnalytical ChemistryComputer SecurityMedicine
    • by 
    •   15  
      Computer ScienceElectronic VotingComputer SecurityVoting
    • by 
    •   4  
      SociologyArt EducationHackerCurriculum and Pedagogy
RESUME : La fraude bancaire, tout particulierement celle qui implique l’hameconnage, reste un enjeu majeur de la relation qu’entretiennent les banques avec leurs clients. Les statistiques croissantes sur les montants derobes des comptes... more
    • by 
    • Political Science
    • by 
    •   8  
      Computer ScienceComputer SecurityInternet of ThingsHacker
A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a vehicle contain 70 or more ECU's (Electronic Control Units) on an ...
    • by 
    •   3  
      EngineeringComputer SecurityHacker
In this contribution we present a novel work of text steganography. Now a days, maintain the security of the secret data has been a great challenge. Sender can encrypt the message before sending it. Encrypted messages sending frequently... more
    • by 
    •   7  
      Computer ScienceComputer SecurityEncryptionSteganography
    • by 
    •   7  
      BusinessInformation SystemsCognitive ScienceInformation Security
There is widespread agreement that information systems are the lifeblood of the global economy, providing businesses with a crucial competitive edge in international markets and giving the world's governments and corporations of the... more
    • by 
    •   7  
      BusinessInformation SystemsCognitive ScienceInformation Security
Piracy is a significant source of concern facing software developers, music labels, and movie production companies. Firms continue to invest in digital rights management technologies to thwart piracy, but their efforts are quickly... more
    • by 
    •   5  
      Computer ScienceHackerPublic GoodDigital Rights Management
In the evolving landscape of cybersecurity, understanding the psychological dimensions of both attackers and defenders is crucial. Cybersecurity is not just a technical field but also one that is deeply intertwined with human behaviour... more
    • by 
    •   4  
      CyberpsychologyCybercrimesCybersecurityCyberpsychology & Behavior
    • by 
    •   17  
      EngineeringAerospace EngineeringComputer SciencePhilosophy
    • by 
    •   18  
      BusinessFinanceComputer ScienceLaw
Currently, the software handled by hackers is the main one to tackle a series of empirical knowledge, with this software attacking and helping organizations. The main objective is to analyze and systematize the software that is detected... more
    • by 
    •   7  
      Computer ScienceComputer SecurityHackerSoftware
    • by 
    •   15  
      SociologySynthetic BiologyBiotechnologyMedicine
    • by 
    •   15  
      SociologySynthetic BiologyBiotechnologyMedicine
    • by 
    •   20  
      BusinessMarketingFinanceComputer Science