Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
Proactive identification of cybersecurity compromises via the PROID compromise assessment framework. [PDF]
Alkhalaf AA +3 more
europepmc +1 more source
Software defined network intrusion system to detect malicious attacks in computer Internet of Things security using deep extractor supervised random forest technique. [PDF]
Mujahid M +4 more
europepmc +1 more source
Development of a Thermal Infrared Network for Volcanic and Environmental Monitoring: Hardware Design and Data Analysis Software Code. [PDF]
Sansivero F, Vilardo G, Buonocunto C.
europepmc +1 more source
Network intrusion detection using a hybrid graph-based convolutional network and transformer architecture. [PDF]
Appiahene P +6 more
europepmc +1 more source
Scalable cyberinfrastructure for experimental NMR data. [PDF]
Hoch JC +26 more
europepmc +1 more source
Transformer-Based Multi-Source Transfer Learning for Intrusion Detection Models with Privacy and Efficiency Balance. [PDF]
Yang B, Zhang G, Wang K.
europepmc +1 more source
The B-Health Box: A Standards-Based Fog IoT Gateway for Interoperable Health and Wellbeing Data Collection. [PDF]
Marques M +5 more
europepmc +1 more source
BIOMERO: A scalable and extensible image analysis framework. [PDF]
Luik TT +4 more
europepmc +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source

