候选人名单 发表于 2025-3-21 17:50:19

书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0162171<br><br>        <br><br>书目名称Artificial Intelligence and Blockchain for Future Cybersecurity Applications读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0162171<br><br>        <br><br>

languid 发表于 2025-3-21 22:20:30

Securing Vehicular Network Using AI and Blockchain-Based Approachescome a universal solicitude. Vehicular communication aims to provide secure communication and reduce the cost of traffic congestion by processing real-time data. This proliferation paradigm of vehicular systems represents several options for communication such as message sharing and data transmissio

陪审团每个人 发表于 2025-3-22 02:53:35

http://reply.papertrans.cn/17/1622/162171/162171_3.png

培养 发表于 2025-3-22 05:56:56

Blockchain for Cybersecurity in IoTchnologies is paramount and especially for businesses and institutions, also IoT considered as the engine of smart cities because it can be applied in different smart city services to facilitate the human daily lifestyle. However, this evolution brings cybersecurity challenges. Thus, security and pr

带伤害 发表于 2025-3-22 10:07:40

http://reply.papertrans.cn/17/1622/162171/162171_5.png

悲痛 发表于 2025-3-22 16:41:51

Classification of Cyber Security Threats on Mobile Devices and Applicationsal need to understand all cyber threats characteristics in order to prevent their risks. However, most of cyber threats classifications are usually limited and based on one or two criteria in the classification process of threats. In addition, the current frameworks did not present an exhaustive lis

拱形大桥 发表于 2025-3-22 19:33:12

Revisiting the Approaches, Datasets and Evaluation Parameters to Detect Android Malware: A Comparatievelop malware for android devices. In addition, malware authors are trying to make malicious android applications that severely undermine the potential of traditional malware detectors. The key purpose of the chapter is to analyze and have a different appearance at various techniques of Android mal

信徒 发表于 2025-3-22 23:47:01

IFIFDroid: Important Features Identification Framework in Android Malware Detectionon point by attackers now-a-days. Thus, android malware detection has become a major field of investigation among the researchers and academicians who are working with in the field of cyber security. As there are lots of research works have done already, it is still major matter of concern to improv

COST 发表于 2025-3-23 03:36:33

http://reply.papertrans.cn/17/1622/162171/162171_9.png

interrogate 发表于 2025-3-23 08:12:46

Improved Secure Intrusion Detection System by User-Defined Socket and Random Forest Classifierstealing activities. Existing research in the field of the IDS system has been considered. The model has been developed to send and receive data. The IDS system is proposed to detect, classify the intrusion with the integration of the Random forest algorithm. The socket programming has been used to
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Yassine Maleh,Youssef Baddi,Imed Romdhani Book 2021 The Edit