找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Yassine Maleh,Youssef Baddi,Imed Romdhani Book 2021 The Edit

[复制链接]
楼主: 候选人名单
发表于 2025-3-25 06:00:25 | 显示全部楼层
A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technolcious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.
发表于 2025-3-25 10:27:31 | 显示全部楼层
A Framework Using Artificial Intelligence for Vision-Based Automated Firearm Detection and Reportinge 3rd person or agency about the incident. It can also manually highlight any object in a frame to keep track of its movement for security purposes. Machine and Deep Learning techniques were used to train models for object detection and facial recognition. The model achieved an accuracy of 97.33% in object detection and 90% in facial recognition.
发表于 2025-3-25 11:54:22 | 显示全部楼层
发表于 2025-3-25 18:49:36 | 显示全部楼层
2197-6503 uture cybersecurity applications.Proposes new models, practi.This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, mode
发表于 2025-3-25 23:58:38 | 显示全部楼层
发表于 2025-3-26 02:51:06 | 显示全部楼层
发表于 2025-3-26 07:10:58 | 显示全部楼层
Towards Sustainable Land Use in Asiak would be in encrypted form to avoid the possibility of data manipulation or access by an unauthentic user. The IDS system is capable to trace attacks of different categories as the random classifier has classified the attacks.
发表于 2025-3-26 11:50:41 | 显示全部楼层
发表于 2025-3-26 15:02:28 | 显示全部楼层
发表于 2025-3-26 16:53:49 | 显示全部楼层
Classification of Cyber Security Threats on Mobile Devices and Applicationsapplications-cyber security threat classifications, which includes most cyber threats classification and principles. The main purpose of our framework is to systematically identify cyber security threats, show their potential impacts, draw the mobile users’ attention to those threats, and enable them to take protective actions as appropriate.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-17 12:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表