Results 111 to 120 of about 23,715 (170)

Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization. [PDF]

open access: yesSci Rep
Dugyala R   +7 more
europepmc   +1 more source

A robust audio steganography technique based on image encryption using different chaotic maps. [PDF]

open access: yesSci Rep
Nasr MA   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy