Found: 17
Select item for more details and to access through your institution.
Enhancing Agricultural Productivity in Uzbekistan: Arduino-Based IoT Framework for Sunflower Seed Yield Improvement through Air and Soil Moisture Monitoring.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 207, doi. 10.54216/JCIM.130217
- By:
- Publication type:
- Article
Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 171, doi. 10.54216/JCIM.130213
- By:
- Publication type:
- Article
Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 191, doi. 10.54216/JCIM.130215
- By:
- Publication type:
- Article
Computational genetic epidemiology: Leveraging HPC for large-scale AI models based on Cyber Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 182, doi. 10.54216/JCIM.130214
- By:
- Publication type:
- Article
Cybersecurity Approaches for Securing Digital Marketing Data.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 199, doi. 10.54216/JCIM.130216
- By:
- Publication type:
- Article
Prediction of Skin Lesions Using Integrated Multi-Layered Network Model with Baseline Learning Approaches.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 155, doi. 10.54216/JCIM.130212
- By:
- Publication type:
- Article
Modelling an Improved Swarm Optimizer and Boosted Quantile Estimator For Malicious Flow Monitoring And Prediction In Network.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 124, doi. 10.54216/JCIM.130210
- By:
- Publication type:
- Article
Optimizing AI-Based Automated Security Patch Deployment in IoT Devices to Combat Zero-Day Exploits and Advanced Cyber Attacks.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 30, doi. 10.54216/JCIM.130203
- By:
- Publication type:
- Article
Heterogeneous Wireless Sensor Network Design with Optimal Energy Conservation and Security through Efficient Routing Algorithm.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 140, doi. 10.54216/JCIM.130211
- By:
- Publication type:
- Article
Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 96, doi. 10.54216/JCIM.130208
- By:
- Publication type:
- Article
Hybridization of Deep Sequential Network for Emotion Recognition Using Unconstraint Video Analysis.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 109, doi. 10.54216/JCIM.130209
- By:
- Publication type:
- Article
Discovering Unknown Non-Consecutive Double Byte Biases in RC4 Stream Cipher Algorithm.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 75, doi. 10.54216/JCIM.130206
- By:
- Publication type:
- Article
Advancing IoT Device Security in Smart Cities: Through Innovative Key Generation and Distribution With D_F, Gf, and Multi-Order Recursive Sequences.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 84, doi. 10.54216/JCIM.130207
- By:
- Publication type:
- Article
Boosting Financial Fraud Detection Using Parameter Tuned Ensemble Machine Learning Model.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 66, doi. 10.54216/JCIM.130205
- By:
- Publication type:
- Article
Development of Digital Twin Technology in Hydraulics Based on Simulating and Enhancing System Performance.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 50, doi. 10.54216/JCIM.130204
- By:
- Publication type:
- Article
A Hybrid Intrusion Detection Approach for Cyber Attacks.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 8, doi. 10.54216/JCIM.130201
- By:
- Publication type:
- Article
Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 19, doi. 10.54216/JCIM.130202
- By:
- Publication type:
- Article