Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
-
621
An aspect-oriented framework for systematic security hardening of software
Published 2008“…In this thesis, we address the problems related to the security hardening of open source software. …”
Get full text
Get full text
Get full text
masterThesis -
622
-
623
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
-
624
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
625
A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering
Published 2023“…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …”