Results 31 to 40 of about 7,114,774 (349)
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches.
M. Ferrag +3 more
semanticscholar +1 more source
The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials.
Panpan Jiang +7 more
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li +4 more
doaj +1 more source
The SmartAG partner: CCAFS East Africa Bi-Annual Newsletter, July - December 2019 [PDF]
We are pleased to share with you our SmartAg Partner bi-annual newsletter, highlighting policy engagement, ongoing research, field updates and activities with partners from the second half of ...
CGIAR Research Program on Climate Change, Agriculture and Food Security
core
Symbolic Quantitative Information Flow [PDF]
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P +3 more
core +1 more source
5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park +5 more
doaj +1 more source
The Transport Layer Security (TLS) Protocol Version 1.3
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
E. Rescorla
semanticscholar +1 more source
Reclaiming the political : emancipation and critique in security studies [PDF]
The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced.
Alker H +42 more
core +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +1 more source

