Linked e-resources

Details

Big Data Analytics and Forensics: An Overview
IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case Study
Detection of Enumeration Attacks in Cloud Environments Using Infrastructure Log Data
Cyber Threat Attribution with Multi-View Heuristic Analysis
Security of Industrial Cyberspace: Fair Clustering with Linear Time Approximation
Adaptive Neural Trees for Attack Detection in Cyber Physical Systems
Evaluating Performance of Scalable Fair Clustering Machine Learning Techniques in Detecting Cyber Attacks in Industrial Control Systems
Fuzzy Bayesian Learning for Cyber Threat Hunting in Industrial Control Systems
Cyber-Attack Detection in Cyber-Physical Systems Using Supervised Machine Learning
Evaluation of Scalable Fair Clustering Machine Learning Methods for Threat Hunting in Cyber-Physical Systems
Evaluation of Supervised and Unsupervised Machine Learning Classifiers for Mac OS Malware Detection
Evaluation of Machine Learning Algorithms on Internet of Things (IoT) Malware Opcodes
Mac OS X Malware Detection with Supervised Machine Learning Algorithms
Machine Learning for OSX Malware Detection
Hybrid Analysis on Credit Card Fraud Detection Using Machine Learning Techniques
Mapping CKC Model Through NLP Modelling for APT Groups Reports
Ransomware Threat Detection: A Deep Learning Approach
Scalable Fair Clustering Algorithm for Internet of Things Malware Classification.

Browse Subjects

Show more subjects...

Statistics

from
to
Export