友好 发表于 2025-3-28 17:46:26

http://reply.papertrans.cn/17/1671/167078/167078_41.png

Militia 发表于 2025-3-28 20:19:19

,An Innovative Feature Selection Approach for CAN Bus Data Leveraging Constant Value Analysis,tationally efficient IDS solutions compatible with systems constrained by limited computing and storage resources. One way to achieve this is to use feature selection methods to reduce computational costs. However, selecting a subset of features introduces a potential vulnerability, allowing adversa

Vo2-Max 发表于 2025-3-29 01:59:40

http://reply.papertrans.cn/17/1671/167078/167078_43.png

按时间顺序 发表于 2025-3-29 04:39:01

http://reply.papertrans.cn/17/1671/167078/167078_44.png

Perennial长期的 发表于 2025-3-29 09:45:45

,Security Perspectives in Integrity Verification for Shared Data in Cloud—A Survey, order to study the new security perspectives in the context of integrity verification for shared data in the cloud, this research article conducts an extensive examination of the existing solutions. A key component of cloud security, data integrity, is thoroughly examined with an emphasis on the di

Desert 发表于 2025-3-29 15:06:03

http://reply.papertrans.cn/17/1671/167078/167078_46.png

上涨 发表于 2025-3-29 17:30:18

http://reply.papertrans.cn/17/1671/167078/167078_47.png

冬眠 发表于 2025-3-29 21:28:05

,A Review on Privacy Enhanced Distributed ML Against Poisoning Attacks, better increase the size of training data, it is necessary to distribute the machine learning workload to different nodes. Such learning systems are referred to as distributed learning systems. With the advancement of machine learning, processing all the data on a single server has become challengi

scotoma 发表于 2025-3-30 02:05:52

http://reply.papertrans.cn/17/1671/167078/167078_49.png

puzzle 发表于 2025-3-30 06:06:05

A Genetic-Muted Leader Scheme with CNN-Based IDS for Industrial Internet of Things Networks,of Things (IIoT) has established a large network due to the sheer volume of information and linked equipment. IIoT networks are made to be vulnerable in terms of cybersecurity. So as to ensure the security of the IIoT networks, intrusion detection systems (IDS) must be developed. This study suggests
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: AI Applications in Cyber Security and Communication Networks; Proceedings of Ninth Chaminda Hewage,Liqaa Nawaf,Nishtha Kesswani Conference