Results 111 to 120 of about 145,910 (140)
Some of the next articles are maybe not open access.
Face recognition system for access control using principal component analysis
International Conference on Speech Technology and Human-Computer Dialogue, 2017Nikita Bakshi, V. Prabhu
semanticscholar +1 more source
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
Intrusion detection technique by using fuzzy ART on computer network security
2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2012Preecha Somwang, W. Lilakiatsakun
semanticscholar +1 more source
Foundations of Security Analysis and Design VII
Lecture Notes in Computer Science, 2014A. Aldini, R. Gorrieri
semanticscholar +1 more source
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
Security evaluation of a wireless ad-hoc network with dynamic topology
Automatic Control and Computer Sciences, 2017M. Kalinin, A. Minin
semanticscholar +1 more source
International Conference on Cryptography, Security and Privacy, 2014
S. Lekshmi+2 more
semanticscholar +1 more source
S. Lekshmi+2 more
semanticscholar +1 more source