Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
DeepLASD countermeasure for logical access audio spoofing. [PDF]
Al-Tairi H +3 more
europepmc +1 more source
Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography. [PDF]
Bhattacharya A +5 more
europepmc +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
PPG-based biometric authentication: A review on architectures, datasets, attacks and security challenges. [PDF]
Aguilar D +3 more
europepmc +1 more source
GNSS Interference Identification Driven by Eye Pattern Features: ICOA-CNN-ResNet-BiLSTM Optimized Deep Learning Architecture. [PDF]
Wu C, Ji Y, Sun X.
europepmc +1 more source
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. [PDF]
Kilany S, Mahfouz A.
europepmc +1 more source
Exploring Multi-Channel GPS Receivers for Detecting Spoofing Attacks on UAVs Using Machine Learning. [PDF]
Mouzai M +3 more
europepmc +1 more source
Explainable multi agent reinforcement learning framework for secure and adaptive communication in UAV swarm based fanets. [PDF]
Alkahtani HK +3 more
europepmc +1 more source
From Concrete to Code: A Survey of AI-Driven Transportation Infrastructure, Security, and Human Interaction. [PDF]
Kose NA, Kose K, Liang F.
europepmc +1 more source

