Found: 16
Select item for more details and to access through your institution.
A Novel Secured Deep Learning Model for COVID Detection Using Chest X-Rays.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 227, doi. 10.54216/JCIM.140116
- By:
- Publication type:
- Article
Prediction of Traffic Congestion in Vehicular Ad-Hoc Networks Employing Extreme Deep Learning Machines (Edrlm).
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 218, doi. 10.54216/JCIM.140115
- By:
- Publication type:
- Article
Novel Slumped SRAM Configuration using QCA Leveraging Differential Voltage Sensing for Enhanced Stability and Efficiency.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 207, doi. 10.54216/JCIM.140114
- By:
- Publication type:
- Article
NCBI Medical Data Encryption with Lossless DNA Compression.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 197, doi. 10.54216/JCIM.140113
- By:
- Publication type:
- Article
Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 179, doi. 10.54216/JCIM.140112
- By:
- Publication type:
- Article
Enhancing Energy Efficiency in Heterogeneous Cyber Security Networks Using Deep Q-Networks Data Routing.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 160, doi. 10.54216/JCIM.140111
- By:
- Publication type:
- Article
Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 141, doi. 10.54216/JCIM.140110
- By:
- Publication type:
- Article
Fortifying Connected Vehicles Based Cybersecurity Measures for Secure Over-the-Air Software Updates.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 125, doi. 10.54216/JCIM.140109
- By:
- Publication type:
- Article
Concealed Chosen Plaintext Attack on Multiple S-boxes Based Image Encryption.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 114, doi. 10.54216/JCIM.140108
- By:
- Publication type:
- Article
Investigating the Efficacy of Deep Reinforcement Learning Models in Detecting and Mitigating Cyber-attacks: a Novel Approach.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 96, doi. 10.54216/JCIM.140107
- By:
- Publication type:
- Article
Security Validation in OpenStack: A Comprehensive Evaluation.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 79, doi. 10.54216/JCIM.140106
- By:
- Publication type:
- Article
ML-based Intrusion Detection for Drone IoT Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 64, doi. 10.54216/JCIM.140105
- By:
- Publication type:
- Article
Secure Medical Records Through Big Data Analytics and Blockchain.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 50, doi. 10.54216/JCIM.140104
- By:
- Publication type:
- Article
Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 34, doi. 10.54216/JCIM.140103
- By:
- Publication type:
- Article
Anomaly-Based Intrusion Detection Systems Using Machine Learning.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 20, doi. 10.54216/JCIM.140102
- By:
- Publication type:
- Article
The impact of AI-based cyber security on the banking and financial sectors.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 8, doi. 10.54216/JCIM.140101
- By:
- Publication type:
- Article