بدائل البحث:
protection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
protection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
-
1
-
2
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
منشور في 2016"…Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
3
-
4
Degree-Based Network Anonymization
منشور في 2020احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
5
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
منشور في 2019"…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
6
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
منشور في 2020"…The improvement of information technology in the past few years has been encouraging the healthcare sector to share medical data online without any barriers and between different parties. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
8
-
9
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
10
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
منشور في 2022احصل على النص الكامل
doctoralThesis -
11
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل
-
12
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
منشور في 2023"…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …"
احصل على النص الكامل
-
13
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
14
حوكمة الذكاء الاصطناعي ضمن أحكام القانون الدولي لحقوق الإنسان
منشور في 2022احصل على النص الكامل
article -
15
Transmission Line Fault Location Using Unsynchronized Measurements
منشور في 2013احصل على النص الكامل
doctoralThesis -
16
-
17
-
18
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
-
19
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…An innovative Intrusion Detection System (IDS), IntruSafe, has been studied, developed, and presented in this paper that combines Fully Connected Convolutional Neural Network (FCNN) and Long Short-Term Memory (LSTM) to protect the IoMT network from malicious signals. The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. …"
-
20
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"