Results 101 to 110 of about 151,861 (137)
Some of the next articles are maybe not open access.

Unsupervised Ensemble-Kernel Principal Component Analysis for Hyperspectral Anomaly Detection

2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2020
Unsupervised anomaly detection–which aims to identify outliers in data sets without the use of labeled training data–is critically important across a variety of domains including medicine, security, defense, finance, and imaging. In particular, detection
Nicholas Merrill, C. Olson
semanticscholar   +1 more source

An empirical model in intrusion detection systems using principal component analysis and deep learning models

International Conference on Climate Informatics, 2020
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar   +1 more source

Face Recognition System Based on Gabor Wavelets Transform, Principal Component Analysis and Support Vector Machine

International Journal on Advanced Science, Engineering and Information Technology, 2020
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid   +2 more
semanticscholar   +1 more source

An Overview on Data Security in Cloud Computing

arXiv.org, 2018
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and ...
Lynda Kacha, Abdelhafid Zitouni
semanticscholar   +1 more source

Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023
Merin Thomas   +5 more
semanticscholar   +1 more source

Intrusion Detection on Self Organizing Network using PCA and Random Forest

2025 5th International Conference on Soft Computing for Security Applications (ICSCSA)
There are several hazards to internet security as a result of the development of network technology. One cannot stress how crucial intrusion detection systems (IDS) are to network and computer security.
T. Yousuf   +5 more
semanticscholar   +1 more source

Online Security Attack Experience and Worries of Young Adults in the United Kingdom

International Symposium on Human Aspects of Information Security and Assurance, 2022
Najla Aldaraani   +2 more
semanticscholar   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Home - About - Disclaimer - Privacy