Search alternatives:
protection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
protection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
-
1
-
2
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
Published 2016“…Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
3
Information reconciliation through agent controlled graph model. (c2018)
Published 2018Get full text
Get full text
Get full text
masterThesis -
4
Degree-Based Network Anonymization
Published 2020Get full text
Get full text
Get full text
masterThesis -
5
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
Get full text
Get full text
Get full text
masterThesis -
6
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…The improvement of information technology in the past few years has been encouraging the healthcare sector to share medical data online without any barriers and between different parties. …”
Get full text
Get full text
Get full text
masterThesis -
7
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
8
-
9
Android Malware Detection Using Machine Learning
Published 2024“…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
Get full text
article -
10
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
Published 2022Get full text
doctoralThesis -
11
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
12
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
13
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
14
-
15
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
16
-
17
An Adapted Load-Balancing implementation for Sharded Blockchains
Published 2024Get full text
Get full text
Get full text
masterThesis -
18
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
-
19
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…An innovative Intrusion Detection System (IDS), IntruSafe, has been studied, developed, and presented in this paper that combines Fully Connected Convolutional Neural Network (FCNN) and Long Short-Term Memory (LSTM) to protect the IoMT network from malicious signals. The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. …”
-
20
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”