Found: 23
Select item for more details and to access through your institution.
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5542919
- By:
- Publication type:
- Article
Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 9, p. 1411, doi. 10.3390/electronics9091411
- By:
- Publication type:
- Article
Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 7, p. 1704, doi. 10.3390/math11071704
- By:
- Publication type:
- Article
Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
- Published in:
- Remote Sensing, 2019, v. 11, n. 23, p. 2852, doi. 10.3390/rs11232852
- By:
- Publication type:
- Article
Automated Analysis Approach for the Detection of High Survivable Ransomware.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 5, p. 2236, doi. 10.3837/tiis.2020.05.021
- By:
- Publication type:
- Article
Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/2977954
- By:
- Publication type:
- Article
Empowering Precision Medicine: Unlocking Revolutionary Insights through Blockchain-Enabled Federated Learning and Electronic Medical Records.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7476, doi. 10.3390/s23177476
- By:
- Publication type:
- Article
Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 16, p. 7162, doi. 10.3390/s23167162
- By:
- Publication type:
- Article
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 15, p. 6762, doi. 10.3390/s23156762
- By:
- Publication type:
- Article
Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 6970, doi. 10.3390/s22186970
- By:
- Publication type:
- Article
A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 7, p. 2810, doi. 10.3390/s22072810
- By:
- Publication type:
- Article
A Novel Feature-Engineered–NGBoost Machine-Learning Framework for Fraud Detection in Electric Power Consumption Data.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 24, p. 8423, doi. 10.3390/s21248423
- By:
- Publication type:
- Article
Electric theft detection in advanced metering infrastructure using Jaya optimized combined Kernel‐Tree boosting classifier—A novel sequentially executed supervised machine learning approach.
- Published in:
- IET Generation, Transmission & Distribution (Wiley-Blackwell), 2022, v. 16, n. 6, p. 1257, doi. 10.1049/gtd2.12386
- By:
- Publication type:
- Article
Malware Detection Issues, Challenges, and Future Directions: A Survey.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 17, p. 8482, doi. 10.3390/app12178482
- By:
- Publication type:
- Article
Smart Piezoelectric-Based Wearable System for Calorie Intake Estimation Using Machine Learning.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 12, p. 6135, doi. 10.3390/app12126135
- By:
- Publication type:
- Article
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 1, p. 172, doi. 10.3390/app12010172
- By:
- Publication type:
- Article
Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 19, p. 9005, doi. 10.3390/app11199005
- By:
- Publication type:
- Article
Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 3, p. 3725, doi. 10.32604/cmc.2024.048105
- By:
- Publication type:
- Article
A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 3, p. 1231, doi. 10.3390/su14031231
- By:
- Publication type:
- Article
A New Collaborative Multi-Agent Monte Carlo Simulation Model for Spatial Correlation of Air Pollution Global Risk Assessment.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 1, p. 510, doi. 10.3390/su14010510
- By:
- Publication type:
- Article
An Adaptive Early Stopping Technique for DenseNet169-Based Knee Osteoarthritis Detection Model.
- Published in:
- Diagnostics (2075-4418), 2023, v. 13, n. 11, p. 1903, doi. 10.3390/diagnostics13111903
- By:
- Publication type:
- Article
DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection.
- Published in:
- Computers, Materials & Continua, 2021, v. 69, n. 3, p. 3945, doi. 10.32604/cmc.2021.016074
- By:
- Publication type:
- Article
A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 4, p. 15400, doi. 10.48084/etasr.7092
- By:
- Publication type:
- Article