Search alternatives:
protection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
protection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
-
21
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
22
-
23
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
24
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …”
-
25
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
26
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
Published 2017“…Companies are sharing vast online critical data, which exposes their databases to malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
27
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…In this case any centralized control for securing data cannot be assumed to protect confidential data. …”
Get full text
Get full text
Get full text
Get full text
article -
28
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…AI technologies may also face regulatory and legal hurdles related to data confidentiality, protection, and property rights. …”
Get full text
-
29
Information warfare
Published 2017“…We compare our algorithm with other approaches and show the performance results.…”
Get full text
Get full text
Get full text
Get full text
article -
30
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
31
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
-
32
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
-
33
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
-
34
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…The impacts of these security threats can be diminished by providing protection towards the different IoT security features. …”
-
35
Inferential sensing techniques in industrial applications
Published 0007“…There has been many efforts to protect climate at the regional and international level by requiring industries to monitor, limit and report their emissions. …”
Get full text
masterThesis -
36
Axes-Based Encryption Key
Published 2018“…Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
37
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
38
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
39
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…IoT devices share, collect, and exchange data via the internet, wireless networks, or other networks with one another. …”