no code implementations • 27 Mar 2024 • Kyle Stein, Arash Mahyari, Guillermo Francia III, Eman El-Sheikh
Techniques such as Deep Packet Inspection (DPI) have been introduced to allow IDSs analyze the content of network packets, providing more context for identifying potential threats.
1 code implementation • 15 Nov 2022 • Arash Mahyari
Software vulnerabilities, caused by unintentional flaws in source codes, are the main root cause of cyberattacks.
no code implementations • 12 Oct 2021 • Arash Mahyari, Peter Pirolli, Jacqueline A. LeBlanc
Moreover, exercise recommendation systems are significantly different from streaming recommendation systems in that we are not able to collect click feedback from the participants in exercise recommendation systems.
1 code implementation • 10 Feb 2021 • Arash Mahyari
Despite advancements in deep reinforcement learning algorithms, developing an effective exploration strategy is still an open problem.
no code implementations • 1 Oct 2020 • Arash Mahyari, Peter Pirolli
Unhealthy behaviors, e. g., physical inactivity and unhealthful food choice, are the primary healthcare cost drivers in developed countries.