Found: 6
Select item for more details and to access through your institution.
Network Intrusion Detection System Based on Information Gain with Deep Bidirectional Long Short-Term Memory.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 4, p. 45, doi. 10.22266/ijies2024.0831.04
- By:
- Publication type:
- Article
Effectiveness Review of the Machine Learning Algorithms for Scheduling in Cloud Environment.
- Published in:
- Archives of Computational Methods in Engineering, 2023, v. 30, n. 6, p. 3769, doi. 10.1007/s11831-023-09921-0
- By:
- Publication type:
- Article
A Scalable Block Chain Framework for User Identity Management in a Decentralized Network.
- Published in:
- Wireless Personal Communications, 2022, v. 123, n. 4, p. 3719, doi. 10.1007/s11277-021-09310-5
- By:
- Publication type:
- Article
Cloud Integrated IoT Enabled Sensor Network Security: Research Issues and Solutions.
- Published in:
- Wireless Personal Communications, 2020, v. 113, n. 2, p. 747, doi. 10.1007/s11277-020-07251-z
- By:
- Publication type:
- Article
Task scheduling using Ant Colony Optimization in multicore architectures: a survey.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 15, p. 5179, doi. 10.1007/s00500-018-3260-4
- By:
- Publication type:
- Article
Metaheuristic Approach for Scheduling Real-Time Tasks to the Heterogeneous Processors.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 83
- By:
- Publication type:
- Article