بدائل البحث:
code encryption » secure encryption (توسيع البحث)
node detection » drone detection (توسيع البحث), video detection (توسيع البحث), ion detection (توسيع البحث)
code encryption » secure encryption (توسيع البحث)
node detection » drone detection (توسيع البحث), video detection (توسيع البحث), ion detection (توسيع البحث)
-
1
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020الموضوعات: -
2
-
3
Accurate multiple network alignment through context-sensitive random walk
منشور في 2015"…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …"
-
4
-
5
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis -
6
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
منشور في 2022احصل على النص الكامل
doctoralThesis -
7
-
8
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
منشور في 2022"…The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…"
-
9
-
10
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA
منشور في 2006"…On the one hand, the proposed synchronization scheme basically relies on cooperative two-way-ranging/time-of-arrival transactions and a diffusion algorithm that ensures the convergence of clock parameters to average reference values in each node. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
CEAP
منشور في 2016"…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
12
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
-
13
Using Social Network Analysis to Study Business Partnerships
منشور في 2018"…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …"
احصل على النص الكامل
-
14
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
15
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis