找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cybersecurity and Secure Information Systems; Challenges and Solut Aboul Ella Hassanien,Mohamed Elhoseny Book 2019 Springer Nature Switzerl

[复制链接]
楼主: 万能
发表于 2025-3-27 00:15:21 | 显示全部楼层
An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herdingusly. The researchers of the study distinguished and examined the vital open difficulties in fortifying the security in IoT that combines encryption strategies to offer security to exchanged images between connected networks of the two parties. The device is primarily based on a hybrid algorithm tha
发表于 2025-3-27 04:12:26 | 显示全部楼层
发表于 2025-3-27 08:49:15 | 显示全部楼层
发表于 2025-3-27 13:30:45 | 显示全部楼层
Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data Analysisetection are based on blacklisting and heuristics technique. These methods require human intervention to update if any new Spam and Phishing activity occurs. Moreover, these are completely inefficient in detecting new Spam and Phishing activities. These techniques can detect malicious activity only
发表于 2025-3-27 16:57:45 | 显示全部楼层
发表于 2025-3-27 20:02:21 | 显示全部楼层
Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classge number of domain names after that utilization a little subset for real command and control (C&C) server communication. DNS blacklist based on blacklisting and sink-holing is the most commonly used approach to block DGA C&C traffic. This is a daunting task because the network admin has to continuo
发表于 2025-3-27 22:47:58 | 显示全部楼层
发表于 2025-3-28 03:08:47 | 显示全部楼层
发表于 2025-3-28 07:37:12 | 显示全部楼层
Clustering Based Cybersecurity Model for Cloud Data, texts) in the cloud has turned into a pattern among individual and hierarchical clients. Be that as it may, cloud service providers can’t be trusted entirely to guarantee the accessibility or honesty of client data re-appropriated/transferred to the cloud. Consequently, to enhance the cybersecurity
发表于 2025-3-28 13:10:33 | 显示全部楼层
A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques fture for malware family identification which converts malware binaries into gray scale images and then identifies their families by a hybrid in-house model, Convolutional Neural Network and Long Short Term Memory (CNN-LSTM). The significance of the hybrid model enables the network to capture the spa
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-29 12:02
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表