找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities; Sanjay Misra,Amit Kumar Tyagi Book 202

[复制链接]
楼主: Embolism
发表于 2025-3-25 03:43:19 | 显示全部楼层
Biometric E-Voting System for Cybersecurity,res of the system and the inherent cost of implementation were estimated adequately. This will guide Independent National Electoral Commission (INEC) in appropriating the allocation of resources. There is also provision for capital and content insurance cover against the fear of manipulation by elec
发表于 2025-3-25 10:11:26 | 显示全部楼层
Wrapper Based Approach for Network Intrusion Detection Model with Combination of Dual Filtering Tection accuracy of the minority class under the assumption that the overall distribution is unchanged and the information loss of majority samples. Three different decision tree classifiers were used to compute the performance of the selected subset features. Remarkable and outstanding fair comparison
发表于 2025-3-25 13:20:35 | 显示全部楼层
发表于 2025-3-25 18:52:51 | 显示全部楼层
发表于 2025-3-25 20:39:10 | 显示全部楼层
An Obfuscation Technique for Malware Detection and Protection in Sandboxing,s achieved through heatmaps, scroll maps, attention maps, and keyloggers. Then the data has been converted into text and it is stored in the database. The obtained data has been obfuscated and given for futher process. This is achieved through an AI tool called Delphix. Also this chapter gives an ov
发表于 2025-3-26 00:10:33 | 显示全部楼层
Secure Data Sharing with Interplanetary File System for Pharmaceutical Data,raphic Smart Contracts for Device Authentication and User Access control scheme are written in Solidity Language and executed on Remix IDE. Transaction and Execution cost are evaluated for Advanced Encryption Standard (AES) algorithm and Rivest-Shamir-Adelman (RSA) algorithm in terms of ether as gas
发表于 2025-3-26 08:22:26 | 显示全部楼层
发表于 2025-3-26 09:54:44 | 显示全部楼层
Description of a Network Attack Ontology Presented Formally,tégé, an ontology editor. The Attack Scenario class, a core class of the ontology, represents types of network attacks, for example, a Denial of Service attack. The ontology is evaluated by showing three examples of real attacks that are correctly classified by the presented ontology.
发表于 2025-3-26 16:36:03 | 显示全部楼层
A Long Short Term Memory Model for Credit Card Fraud Detection,n programming language. The relevant features selected were then fed into the LSTM-RNN for classification. The results obtained were compared with past work and our fraud model recorded high classification accuracy as well as reduced false alarm rate. It has 99.58% Prediction Accuracy, 99.6% Precisi
发表于 2025-3-26 19:09:05 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-1 09:13
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表