Results 281 to 290 of about 4,301,094 (348)
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence. [PDF]
Anjum M+6 more
europepmc +1 more source
An optimized stacking-based TinyML model for attack detection in IoT networks. [PDF]
Sharma A, Rani S, Shabaz M.
europepmc +1 more source
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation. [PDF]
Prasad VVSH+6 more
europepmc +1 more source
A blockchain secured metaverse framework for scalable and immersive telemedicine. [PDF]
Sonkamble RG+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
, 2022
Instructions. Submit your solution electronically via your class account by Monday Apr 29, at 10:00PM. You should upload a single file, HW4.pdf. Your writeup should include your name, your class account name (e.g., cs161-xy), your TA's name, your ...
Wenliang Du
semanticscholar +1 more source
Instructions. Submit your solution electronically via your class account by Monday Apr 29, at 10:00PM. You should upload a single file, HW4.pdf. Your writeup should include your name, your class account name (e.g., cs161-xy), your TA's name, your ...
Wenliang Du
semanticscholar +1 more source
With the growing requirements for protection generated by legislation such as the 1974 Privacy Act, the increasing complexity of computer and data communications applications, and increasing awareness regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition.
openaire +3 more sources
Lecture Notes in Computer Science, 2018
4. Protect your stuff! Lock it up or take it with you when you leave. Password protect all of your devices. Secure your area and lock your computer screen before leaving them unattended – even just for a second.
William Stallings Lawrie Brown
semanticscholar +2 more sources
4. Protect your stuff! Lock it up or take it with you when you leave. Password protect all of your devices. Secure your area and lock your computer screen before leaving them unattended – even just for a second.
William Stallings Lawrie Brown
semanticscholar +2 more sources
Deception Techniques in Computer Security
ACM Computing Surveys, 2018A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection.
Xiao Han, Nizar Kheir, D. Balzarotti
semanticscholar +1 more source