Found: 22
Select item for more details and to access through your institution.
A Symbiotic Relationship Based Leader Approach for Privacy Protection in Location Based Services.
- Published in:
- ISPRS International Journal of Geo-Information, 2020, v. 9, n. 6, p. 408, doi. 10.3390/ijgi9060408
- By:
- Publication type:
- Article
A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 11, p. 1990, doi. 10.3390/sym13111990
- By:
- Publication type:
- Article
Blockchain Platforms and Access Control Classification for IoT Systems.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 10, p. 1663, doi. 10.3390/sym12101663
- By:
- Publication type:
- Article
Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 33, n. 2, p. 923, doi. 10.32604/iasc.2022.024668
- By:
- Publication type:
- Article
An Interoperable Blockchain Security Frameworks Based on Microservices and Smart Contract in IoT Environment.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 3, p. 776, doi. 10.3390/electronics12030776
- By:
- Publication type:
- Article
N-Versions-Based Resilient Traffic Control Systems.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 15, p. 2414, doi. 10.3390/electronics11152414
- By:
- Publication type:
- Article
Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 5, p. 711, doi. 10.3390/electronics11050711
- By:
- Publication type:
- Article
A Proposal for a Tokenized Intelligent System: A Prediction for an AI-Based Scheduling, Secured Using Blockchain.
- Published in:
- Systems, 2024, v. 12, n. 3, p. 84, doi. 10.3390/systems12030084
- By:
- Publication type:
- Article
Performance evaluation of an oracle-based interoperability for permissioned blockchain.
- Published in:
- Computing, 2024, v. 106, n. 11, p. 3627, doi. 10.1007/s00607-024-01337-3
- By:
- Publication type:
- Article
A Novel Image Encryption Technique Based on Mobius Transformation.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/1912859
- By:
- Publication type:
- Article
FedAvg-P: Performance-Based Hierarchical Federated Learning-Based Anomaly Detection System Aggregation Strategy for Advanced Metering Infrastructure.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 17, p. 5492, doi. 10.3390/s24175492
- By:
- Publication type:
- Article
A Deep Learning Approach for Arabic Manuscripts Classification.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 19, p. 8133, doi. 10.3390/s23198133
- By:
- Publication type:
- Article
Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7464, doi. 10.3390/s23177464
- By:
- Publication type:
- Article
Deep Reinforcement Learning for Workload Prediction in Federated Cloud Environments.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 15, p. 6911, doi. 10.3390/s23156911
- By:
- Publication type:
- Article
LSHADE-SPA memetic framework for solving large-scale optimization problems.
- Published in:
- Complex & Intelligent Systems, 2019, v. 5, n. 1, p. 25, doi. 10.1007/s40747-018-0086-8
- By:
- Publication type:
- Article
An Empirical Performance Analysis of the Speak Correct Computerized Interface.
- Published in:
- Processes, 2022, v. 10, n. 3, p. 487, doi. 10.3390/pr10030487
- By:
- Publication type:
- Article
Evaluation of Different Plagiarism Detection Methods: A Fuzzy MCDM Perspective.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 9, p. N.PAG, doi. 10.3390/app12094580
- By:
- Publication type:
- Article
Towards Sustainable Energy Grids: A Machine Learning-Based Ensemble Methods Approach for Outages Estimation in Extreme Weather Events.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 16, p. 12622, doi. 10.3390/su151612622
- By:
- Publication type:
- Article
A security testing mechanism for detecting attacks in distributed software applications using blockchain.
- Published in:
- PLoS ONE, 2023, v. 17, n. 1, p. 1, doi. 10.1371/journal.pone.0280038
- By:
- Publication type:
- Article
Speak-Correct: A Computerized Interface for the Analysis of Mispronounced Errors.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 3, p. 1155, doi. 10.32604/csse.2022.024967
- By:
- Publication type:
- Article
Towards Building an Arabic Plagiarism Detection System: Plagiarism Detection in Arabic.
- Published in:
- International Journal of Information Retrieval Research, 2019, v. 9, n. 3, p. N.PAG, doi. 10.4018/IJIRR.2019070102
- By:
- Publication type:
- Article
Double Cache Approach with Wireless Technology for Preserving User Privacy.
- Published in:
- Wireless Communications & Mobile Computing, 2018, p. 1, doi. 10.1155/2018/4607464
- By:
- Publication type:
- Article