Found: 11
Select item for more details and to access through your institution.
Double Layered Priority based Gray Wolf Algorithm (PrGWO-SK) for safety management in IoT network through anomaly detection.
- Published in:
- Maintenance & Reliability / Eksploatacja i Niezawodność, 2022, v. 24, n. 4, p. 641, doi. 10.17531/ein.2022.4.5
- By:
- Publication type:
- Article
TransNet: a comparative study on breast carcinoma diagnosis with classical machine learning and transfer learning paradigm.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 11, p. 33855, doi. 10.1007/s11042-023-16938-x
- By:
- Publication type:
- Article
A Survey on the Detection of SQL Injection Attacks and Their Countermeasures.
- Published in:
- Journal of Information Processing Systems, 2017, v. 13, n. 4, p. 689, doi. 10.37 45/JIPS.03.0024
- By:
- Publication type:
- Article
Toward intelligent resource management in dynamic Fog Computing‐based Internet of Things environment with Deep Reinforcement Learning: A survey.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 4, p. 1, doi. 10.1002/dac.5411
- By:
- Publication type:
- Article
A VIABLE SOLUTION TO PREVENT SQL INJECTION ATTACK USING SQL INJECTION.
- Published in:
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 3, p. 5, doi. 10.26634/jcom.3.3.3660
- By:
- Publication type:
- Article
Analysis of Security-Based Access Control Models for Cloud Computing.
- Published in:
- International Journal of Cloud Applications & Computing, 2022, v. 12, n. 1, p. 1, doi. 10.4018/IJCAC.2022010104
- By:
- Publication type:
- Article
A hybrid intelligently initialized particle swarm optimizer with weight factored binary gray wolf optimizer for mitigation of security issues in Internet of Things and sensor nodes.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 5, p. 1, doi. 10.1002/cpe.7548
- By:
- Publication type:
- Article
Analysis of recent advancements in support vector machine.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 25, p. 1, doi. 10.1002/cpe.7270
- By:
- Publication type:
- Article
Gravitational search algorithm‐driven missing links prediction in social networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 11, p. 1, doi. 10.1002/cpe.6901
- By:
- Publication type:
- Article
Multilevel authentication protocol for enabling secure communication in Internet of Things.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 3, p. 1, doi. 10.1002/cpe.6578
- By:
- Publication type:
- Article
A Probabilistic Analysis of Path Duration Using Routing Protocol in VANETs.
- Published in:
- International Journal of Vehicular Technology, 2014, p. 1, doi. 10.1155/2014/495036
- By:
- Publication type:
- Article