Results 111 to 120 of about 35,554 (200)

SCADA intrusion detection using deep factorization machines. [PDF]

open access: yesSci Rep
Zakariah M   +4 more
europepmc   +1 more source

Mitigating distributed denial of service attacks using attribute subset selection with temporal convolutional networks. [PDF]

open access: yesSci Rep
Alamro H   +7 more
europepmc   +1 more source

Detection of submarines [PDF]

open access: yes, 2008
Hayes, Harvey Cornelius
core  

Home - About - Disclaimer - Privacy