Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System
Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks
Intrusion Detection using Anomaly Detection Algorithm and Snort
Research Perspective on Digital Forensic Tools and Investigation Process
Intelligent Authentication Framework for Internet of Medical Things (IoMT)
Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network
A Systematic Literature Review on Face Morphing Attack Detection (MAD)
Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection
A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain
Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique
An Integrated IDS using ICA-based Feature Selection and SVM Classification Method
A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data
Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System
Authenticated Encryption to Prevent Cyberattacks in images
Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.

Browse Subjects

Show more subjects...

Statistics

from
to
Export