Found: 32
Select item for more details and to access through your institution.
A Kullback-Liebler divergence-based representation algorithm for malware detection.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1492
- By:
- Publication type:
- Article
Unsupervised Anomaly Detection for Unlabelled Wireless Sensor Networks Data.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2018, v. 10, n. 2, p. 172
- By:
- Publication type:
- Article
Lightweight Symmetric Encryption Algorithm In Big Data.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2015, v. 7, n. 3, p. 45
- By:
- Publication type:
- Article
A Review of the Opinion Target Extraction using Sequence Labeling Algorithms based on Features Combinations.
- Published in:
- Journal of Internet Computing & Services, 2016, v. 17, n. 5, p. 111, doi. 10.7472/jksii.2016.17.5.111
- By:
- Publication type:
- Article
An Adaptive Intrusion Detection Scheme for Cloud Computing.
- Published in:
- International Journal of Swarm Intelligence Research, 2019, v. 10, n. 4, p. N.PAG, doi. 10.4018/IJSIR.2019100104
- By:
- Publication type:
- Article
Optimal control overhead based multi-metric routing for MANET.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 6, p. 2319, doi. 10.1007/s11276-017-1468-3
- By:
- Publication type:
- Article
Attention-Based Joint Learning for Intent Detection and Slot Filling Using Bidirectional Long Short-Term Memory and Convolutional Neural Networks: (AJLISBC).
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 915, doi. 10.14569/ijacsa.2024.0150890
- By:
- Publication type:
- Article
Solving Task Scheduling Problem in Cloud Computing Environment Using Orthogonal Taguchi-Cat Algorithm.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2017, v. 7, n. 3, p. 1489, doi. 10.11591/ijece.v7i3.pp1489-1497
- By:
- Publication type:
- Article
A Hybrid Color Space for Skin Detection Using Genetic Algorithm Heuristic Search and Principal Component Analysis Technique.
- Published in:
- PLoS ONE, 2015, v. 10, n. 8, p. 1, doi. 10.1371/journal.pone.0134828
- By:
- Publication type:
- Article
Dynamic Extraction of Initial Behavior for Evasive Malware Detection.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 2, p. 416, doi. 10.3390/math11020416
- By:
- Publication type:
- Article
A Semisupervised Concept Drift Adaptation via Prototype-Based Manifold Regularization Approach with Knowledge Transfer.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 2, p. 355, doi. 10.3390/math11020355
- By:
- Publication type:
- Article
An effective attack scenario construction model based on identification of attack steps and stages.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1481, doi. 10.1007/s10207-023-00701-2
- By:
- Publication type:
- Article
Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
- Published in:
- Remote Sensing, 2019, v. 11, n. 23, p. 2852, doi. 10.3390/rs11232852
- By:
- Publication type:
- Article
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 21, p. 8564, doi. 10.3390/s22218564
- By:
- Publication type:
- Article
Prototype Regularized Manifold Regularization Technique for Semi-Supervised Online Extreme Learning Machine.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 9, p. 3113, doi. 10.3390/s22093113
- By:
- Publication type:
- Article
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 4, p. N.PAG, doi. 10.3390/s22041494
- By:
- Publication type:
- Article
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 23, p. 8017, doi. 10.3390/s21238017
- By:
- Publication type:
- Article
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues.
- Published in:
- Sensors (14248220), 2013, v. 13, n. 8, p. 10087, doi. 10.3390/s130810087
- By:
- Publication type:
- Article
Malware Detection Issues, Challenges, and Future Directions: A Survey.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 17, p. 8482, doi. 10.3390/app12178482
- By:
- Publication type:
- Article
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 1, p. 172, doi. 10.3390/app12010172
- By:
- Publication type:
- Article
A Distributed Intrusion Detection Scheme for Cloud Computing.
- Published in:
- International Journal of Distributed Systems & Technologies, 2020, v. 11, n. 1, p. N.PAG, doi. 10.4018/IJDST.2020010106
- By:
- Publication type:
- Article
Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends.
- Published in:
- Journal of Information Assurance & Security, 2017, v. 12, n. 4, p. 124
- By:
- Publication type:
- Article
Phishing Website Classification: A Machine Learning Approach.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 5, p. 222
- By:
- Publication type:
- Article
Optimized Reliable Hybrid Routing Protocol Based Link Stability for Mobile Wireless Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 473, doi. 10.1007/s11277-018-5853-8
- By:
- Publication type:
- Article
Fast and Effective Bag-of-Visual-Word Model to Pornographic Images Recognition Using the FREAK Descriptor.
- Published in:
- Journal of Soft Computing & Decision Support Systems, 2015, v. 2, n. 6, p. 27
- By:
- Publication type:
- Article
HYBRID CAT SWARM OPTIMIZATION AND SIMULATED ANNEALING FOR DYNAMIC TASK SCHEDULING ON CLOUD COMPUTING ENVIRONMENT.
- Published in:
- Journal of Information & Communication Technology, 2018, v. 17, n. 3, p. 435, doi. 10.32890/jict2018.17.3.3
- By:
- Publication type:
- Article
Dynamic scheduling of heterogeneous resources across mobile edge-cloud continuum using fruit fly-based simulated annealing optimization scheme.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 16, p. 14085, doi. 10.1007/s00521-022-07260-y
- By:
- Publication type:
- Article
Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation.
- Published in:
- PLoS ONE, 2016, v. 11, n. 11, p. 1, doi. 10.1371/journal.pone.0166017
- By:
- Publication type:
- Article
Cloud customers service selection scheme based on improved conventional cat swarm optimization.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 18, p. 14817, doi. 10.1007/s00521-020-04834-6
- By:
- Publication type:
- Article
An optimized skin texture model using gray-level co-occurrence matrix.
- Published in:
- Neural Computing & Applications, 2019, v. 31, n. 6, p. 1835, doi. 10.1007/s00521-017-3164-8
- By:
- Publication type:
- Article
Orthogonal Taguchi-based cat algorithm for solving task scheduling problem in cloud computing.
- Published in:
- Neural Computing & Applications, 2018, v. 30, n. 6, p. 1845, doi. 10.1007/s00521-016-2816-4
- By:
- Publication type:
- Article
CFaaS: bilaterally agreed evidence collection.
- Published in:
- Journal of Cloud Computing (2192-113X), 2018, v. 7, n. 1, p. 1, doi. 10.1186/s13677-017-0102-3
- By:
- Publication type:
- Article