Found: 8
Select item for more details and to access through your institution.
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 764, doi. 10.3390/jcp2040039
- By:
- Publication type:
- Article
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 778, doi. 10.3390/jcp2040040
- By:
- Publication type:
- Article
A Survey of the Recent Trends in Deep Learning Based Malware Detection.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 800, doi. 10.3390/jcp2040041
- By:
- Publication type:
- Article
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 830, doi. 10.3390/jcp2040042
- By:
- Publication type:
- Article
Cybersecurity in Hospitals: An Evaluation Model.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 853, doi. 10.3390/jcp2040043
- By:
- Publication type:
- Article
Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 862, doi. 10.3390/jcp2040044
- By:
- Publication type:
- Article
An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 882, doi. 10.3390/jcp2040045
- By:
- Publication type:
- Article
User Reputation on E-Commerce: Blockchain-Based Approaches.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 907, doi. 10.3390/jcp2040046
- By:
- Publication type:
- Article