Found: 30
Select item for more details and to access through your institution.
Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK.
- Published in:
- Computing, 2024, v. 106, n. 12, p. 4015, doi. 10.1007/s00607-024-01344-4
- By:
- Publication type:
- Article
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.
- Published in:
- Journal of Organizational & End User Computing, 2020, v. 32, n. 3, p. N.PAG, doi. 10.4018/JOEUC.2020070104
- By:
- Publication type:
- Article
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, v. 9, n. 5, p. 1, doi. 10.1155/2013/416983
- By:
- Publication type:
- Article
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/416983
- By:
- Publication type:
- Article
MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 39/40, p. 29923, doi. 10.1007/s11042-020-09444-x
- By:
- Publication type:
- Article
Towards Real-Time Warning and Defense Strategy AI Planning for Cyber Security Systems Aided by Security Ontology.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 24, p. 4128, doi. 10.3390/electronics11244128
- By:
- Publication type:
- Article
Digital Twin-Based Zero-Touch Management for IoT.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 24, p. 4104, doi. 10.3390/electronics11244104
- By:
- Publication type:
- Article
Feature-Enhanced Document-Level Relation Extraction in Threat Intelligence with Knowledge Distillation.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 22, p. 3715, doi. 10.3390/electronics11223715
- By:
- Publication type:
- Article
Propofol Inhibits the Activation of p38 through Up- Regulating the Expression of Annexin A1 to Exert Its Anti-Inflammation Effect.
- Published in:
- PLoS ONE, 2011, v. 6, n. 12, p. 1, doi. 10.1371/journal.pone.0027890
- By:
- Publication type:
- Article
A Novel Threat Intelligence Information Extraction System Combining Multiple Models.
- Published in:
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/8477260
- By:
- Publication type:
- Article
Propofol maintains Th17/Treg cell balance and reduces inflammation in rats with traumatic brain injury via the miR-145-3p/NFATc2/NF-κB axis.
- Published in:
- International Journal of Molecular Medicine, 2021, v. 48, n. 1, p. N.PAG, doi. 10.3892/ijmm.2021.4968
- By:
- Publication type:
- Article
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5483918
- By:
- Publication type:
- Article
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6417407
- By:
- Publication type:
- Article
Bidirectional wind response control of 76‐story benchmark building using active mass damper with a rotating actuator.
- Published in:
- Structural Control & Health Monitoring, 2018, v. 25, n. 10, p. 1, doi. 10.1002/stc.2216
- By:
- Publication type:
- Article
Study on the extraction of aloe polysaccharide by ultrasound assisted compound enzyme.
- Published in:
- China Food Additives, 2022, v. 33, n. 3, p. 51, doi. 10.19804/j.issn1006-2513.2022.03.008
- By:
- Publication type:
- Article
An Insider Threat Detection Method Based on Business Process Mining.
- Published in:
- International Journal of Business Data Communications & Networking, 2017, v. 13, n. 2, p. 83, doi. 10.4018/ijbdcn.2017070107
- By:
- Publication type:
- Article
Two-Round Password-Based Authenticated Key Exchange from Lattices.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8893628
- By:
- Publication type:
- Article
Two-Round Password-Based Authenticated Key Exchange from Lattices.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8893628
- By:
- Publication type:
- Article
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8850356
- By:
- Publication type:
- Article
Trigger-free cybersecurity event detection based on contrastive learning.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20984, doi. 10.1007/s11227-023-05454-2
- By:
- Publication type:
- Article
Dexmedetomidine protects against high mobility group box 1‐induced cellular injury by inhibiting pyroptosis.
- Published in:
- Cell Biology International, 2019, v. 43, n. 6, p. 651, doi. 10.1002/cbin.11140
- By:
- Publication type:
- Article
A Hybrid Method of Coreference Resolution in Information Security.
- Published in:
- Computers, Materials & Continua, 2020, v. 64, n. 2, p. 1297, doi. 10.32604/cmc.2020.010855
- By:
- Publication type:
- Article
Effect of ART-Annealing Conditions on Microstructural Regulation and Deformation Behavior of 0.17C-9Mn-3.5Al TRIP-Aided Steel.
- Published in:
- Steel Research International, 2017, v. 88, n. 8, p. n/a, doi. 10.1002/srin.201600410
- By:
- Publication type:
- Article
Open-circuit fault diagnosis for a faulttolerant three-level neutral-point-clamped STATCOM.
- Published in:
- IET Power Electronics (Wiley-Blackwell), 2019, v. 12, n. 4, p. 810, doi. 10.1049/iet-pel.2018.5802
- By:
- Publication type:
- Article
Zero trust management of data flow between IoT edge nodes based on SDN.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 7, p. 101, doi. 10.11959/j.issn.1000-436x.2024060
- By:
- Publication type:
- Article
Research on industrial Internet security detection and response based on digital twin.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 6, p. 87, doi. 10.11959/j.issn.1000-436x.2024091
- By:
- Publication type:
- Article
Edge computing privacy protection method based on blockchain and federated learning.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2021, v. 42, n. 11, p. 28, doi. 10.11959/j.issn.1000-436x.2021190
- By:
- Publication type:
- Article
Collaborative Detection of Cyber Security Threats in Big Data.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2019, v. 16, n. 2, p. 186
- By:
- Publication type:
- Article
FLP: a feature-based method for log parsing.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 23, p. 1334, doi. 10.1049/el.2018.6079
- By:
- Publication type:
- Article
FLP: a feature‐based method for log parsing.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 22, p. 1334, doi. 10.1049/el.2018.6079
- By:
- Publication type:
- Article