Search alternatives:
protection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
Showing 21 - 39 results of 39 for search 'data protection algorithm', query time: 0.06s Refine Results
  1. 21

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations by Mueen Uddin (4903510)

    Published 2025
    “…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
  2. 22
  3. 23

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  4. 24

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …”
  5. 25

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
    Get full text
  6. 26

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix by Haraty, Ramzi Ahmed

    Published 2017
    “…Companies are sharing vast online critical data, which exposes their databases to malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 27

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…In this case any centralized control for securing data cannot be assumed to protect confidential data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 28

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…AI technologies may also face regulatory and legal hurdles related to data confidentiality, protection, and property rights. …”
    Get full text
  9. 29

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…We compare our algorithm with other approaches and show the performance results.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 30

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  11. 31

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  12. 32

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
  13. 33

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
  14. 34

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…The impacts of these security threats can be diminished by providing protection towards the different IoT security features. …”
  15. 35

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…There has been many efforts to protect climate at the regional and international level by requiring industries to monitor, limit and report their emissions. …”
    Get full text
    masterThesis
  16. 36

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 37

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  18. 38

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  19. 39

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…IoT devices share, collect, and exchange data via the internet, wireless networks, or other networks with one another. …”