Results 191 to 200 of about 6,155,073 (227)
Some of the next articles are maybe not open access.
Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
Detecting cyber attacks in time : combining attack simulation with detection logic
2021unknown ...
openaire +1 more source
2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
The Arabian journal for science and engineering, 2021
Prabhat Kumar +2 more
semanticscholar +1 more source
Prabhat Kumar +2 more
semanticscholar +1 more source
DDoS attack detection using MLP and Random Forest Algorithms
International journal of information technology, 2022Ashfaq Ahmad Najar, S. Manohar Naik
semanticscholar +1 more source
A novel approach for APT attack detection based on combined deep learning model
Neural computing & applications (Print), 2021Cho Do Xuan, M. Dao
semanticscholar +1 more source
Face Morphing Attack Detection
This chapter examines the privacy threat facing face recognition and morphing detection systems using the LINDUUN framework as the methodology. It describes various aspects of privacy issues that may hamper safe and secured operation of face recognition and morphing attack detection systems.Sulaimon Adebayo Bashir +5 more
openaire +1 more source

