Found: 4
Select item for more details and to access through your institution.
Web Attack Intrusion Detection System Using Machine Learning Techniques.
- Published in:
- International Journal of Online & Biomedical Engineering, 2024, v. 20, n. 3, p. 24, doi. 10.3991/ijoe.v20i03.45249
- By:
- Publication type:
- Article
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 2, p. 2023, doi. 10.32604/cmc.2023.044304
- By:
- Publication type:
- Article
Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning.
- Published in:
- International Journal of Interactive Mobile Technologies, 2022, v. 16, n. 24, p. 81, doi. 10.3991/ijim.v16i24.35763
- By:
- Publication type:
- Article
A New Double-Switch SEPIC-Buck Topology for Renewable Energy Applications.
- Published in:
- Energies (19961073), 2024, v. 17, n. 1, p. 238, doi. 10.3390/en17010238
- By:
- Publication type:
- Article