Found: 33
Select item for more details and to access through your institution.
Digital health transformation in Saudi Arabia: A cross-sectional analysis using Healthcare Information and Management Systems Society' digital health indicators.
- Published in:
- Digital Health, 2022, v. 8, p. 1, doi. 10.1177/20552076221117742
- By:
- Publication type:
- Article
Empirical Method for Thyroid Disease Classification Using a Machine Learning Approach.
- Published in:
- BioMed Research International, 2022, p. 1, doi. 10.1155/2022/9809932
- By:
- Publication type:
- Article
Brief tele-mindfulness-based intervention: A multicenter randomized controlled trial.
- Published in:
- Journal of Family & Community Medicine, 2023, v. 30, n. 3, p. 180, doi. 10.4103/jfcm.jfcm_82_23
- By:
- Publication type:
- Article
Crystal Structure Optimization with Deep-Autoencoder-Based Intrusion Detection for Secure Internet of Drones Environment.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 10, p. 297, doi. 10.3390/drones6100297
- By:
- Publication type:
- Article
Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 9, p. N.PAG, doi. 10.3390/drones6090247
- By:
- Publication type:
- Article
Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 9, p. N.PAG, doi. 10.3390/drones6090222
- By:
- Publication type:
- Article
Blockchain for Secure Healthcare: Opportunities, Challenges and Solutions.
- Published in:
- Mathematical Modelling of Engineering Problems, 2022, v. 9, n. 5, p. 1313, doi. 10.18280/mmep.090520
- By:
- Publication type:
- Article
Multi-Cloud Integration Security Framework Using Honeypots.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/2600712
- By:
- Publication type:
- Article
Feature Subset Selection Hybrid Deep Belief Network Based Cybersecurity Intrusion Detection Model.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 19, p. 3077, doi. 10.3390/electronics11193077
- By:
- Publication type:
- Article
A Novel Anomaly Detection System on the Internet of Railways Using Extended Neural Networks.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182813
- By:
- Publication type:
- Article
Appling tracking game system to measure user behavior toward cybersecurity policies.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 5, p. 5164, doi. 10.11591/ijece.v12i5.pp5164-5175
- By:
- Publication type:
- Article
Effective classification of birds' species based on transfer learning.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 4, p. 4172, doi. 10.11591/ijece.v12i4.pp4172-4184
- By:
- Publication type:
- Article
Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 5, p. 4050, doi. 10.11591/ijece.v11i5.pp4050-4058
- By:
- Publication type:
- Article
Enhancing three variants of harmony search algorithm for continuous optimization problems.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 3, p. 2343, doi. 10.11591/ijece.v11i3.pp2343-2349
- By:
- Publication type:
- Article
Digital health transformation in Saudi Arabia: A cross-sectional analysis using Healthcare Information and Management Systems Society' digital health indicators.
- Published in:
- Digital Health, 2022, v. 8, p. 1, doi. 10.1177/20552076221117742
- By:
- Publication type:
- Article
Homoglyph Attack Detection Model Using Machine Learning and Hash Function.
- Published in:
- Journal of Sensor & Actuator Networks, 2022, v. 11, n. 3, p. N.PAG, doi. 10.3390/jsan11030054
- By:
- Publication type:
- Article
Hybrid Approach for Improving the Performance of Data Reliability in Cloud Storage Management.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 16, p. 5966, doi. 10.3390/s22165966
- By:
- Publication type:
- Article
A Novel Decentralized Blockchain Architecture for the Preservation of Privacy and Data Security against Cyberattacks in Healthcare.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 15, p. 5921, doi. 10.3390/s22155921
- By:
- Publication type:
- Article
Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 19, p. 9513, doi. 10.3390/app12199513
- By:
- Publication type:
- Article
Planet Optimization with Deep Convolutional Neural Network for Lightweight Intrusion Detection in Resource-Constrained IoT Networks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 17, p. 8676, doi. 10.3390/app12178676
- By:
- Publication type:
- Article
Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7441, doi. 10.3390/app12157441
- By:
- Publication type:
- Article
Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 14, p. 6875, doi. 10.3390/app12146875
- By:
- Publication type:
- Article
Query Optimization Framework for Graph Database in Cloud Dew Environment.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 2317, doi. 10.32604/cmc.2023.032454
- By:
- Publication type:
- Article
Performance Framework for Virtual Machine Migration in Cloud Computing.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 3, p. 6289, doi. 10.32604/cmc.2023.035161
- By:
- Publication type:
- Article
Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 3, p. 6587, doi. 10.32604/cmc.2023.034176
- By:
- Publication type:
- Article
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 3, p. 5349, doi. 10.32604/cmc.2023.033532
- By:
- Publication type:
- Article
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 2, p. 3515, doi. 10.32604/cmc.2023.033765
- By:
- Publication type:
- Article
Query Optimization Framework for Graph Database in Cloud Dew Environment.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 2317, doi. 10.32604/cmc.2023.032454
- By:
- Publication type:
- Article
Innovative Fungal Disease Diagnosis System Using Convolutional Neural Network.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 3, p. 4869, doi. 10.32604/cmc.2022.031376
- By:
- Publication type:
- Article
Botnet Attack Detection in IoT Using Machine Learning.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/4515642
- By:
- Publication type:
- Article
Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 1, p. 855, doi. 10.32604/csse.2023.036735
- By:
- Publication type:
- Article
Container Performance and Vulnerability Management for Container Security Using Docker Engine.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6819002
- By:
- Publication type:
- Article
A Deep Learning Network-on-Chip (NoC)-Based Switch-Router to Enhance Information Security in Resource-Constrained Devices.
- Published in:
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 4, p. 1, doi. 10.1142/S0218126624500646
- By:
- Publication type:
- Article