巨硕 发表于 2025-3-23 13:15:53
http://reply.papertrans.cn/27/2646/264582/264582_11.pngcommonsense 发表于 2025-3-23 15:58:58
Mohamed Abdel-Basset,Nour Moustafa,Weiping DingPresents a Machine Learning Approach to Conducting Digital Forensics.Contains state-of-the-art research and shows how to teach hands-on incident response and digital forensic courses.Covers the applic转折点 发表于 2025-3-23 20:04:50
Studies in Computational Intelligencehttp://image.papertrans.cn/d/image/264582.jpginundate 发表于 2025-3-24 00:48:17
https://doi.org/10.1007/978-3-030-89025-4Cyber Forensics; Digital Forensic Education; Digital Forensics; Virtual Machines Forensics; Social Media仪式 发表于 2025-3-24 03:00:29
978-3-030-89027-8The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl讨厌 发表于 2025-3-24 10:06:28
https://doi.org/10.1007/978-3-540-88445-3As IoT technology becomes an integral part of everyday life, enhancing productivity for businesses through automation, it should come as no surprise that attackers would seek to exploit these systems and the services they provide for profit.全能 发表于 2025-3-24 11:43:38
http://reply.papertrans.cn/27/2646/264582/264582_17.pngPalpate 发表于 2025-3-24 18:40:34
Design of Sustainable Product Life CyclesThis chapter elaborates on the potential of unsupervised deep learning solutions for assuring the security of IoT-based systems to give the reader an insightful discussion of how these solutions could satisfy the IoT security requirements necessary to realize a reliable and trustworthy IoT environment.北极人 发表于 2025-3-24 19:58:17
http://reply.papertrans.cn/27/2646/264582/264582_19.pngCriteria 发表于 2025-3-25 00:42:41
https://doi.org/10.1007/978-981-10-0269-4The central intention of this chapter is to discuss the primary security challenges in internet of things (IoT) environments with the main emphasis on the opportunities for deep learning for securing and maintaining the privacy of IoT-based systems.