„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Misclassification in voice over internet protocol honeypots: distinguishing genuine calls from malicious traffic
-
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications
-
Mitigating black-box membership inference attack using metric mapping
-
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets
-
Detecting code vulnerabilities with heterogeneous GNN training
-
Progressive attack graph: a technique for scalable and adaptive attack graph generation
-
Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders
-
Systematic review and characterisation of malicious industrial network traffic datasets
-
Bridging cybersecurity with digital twin technology: a thematic analysis
-
A Systematic Review of Voluntary Cybersecurity Standards and Frameworks
-
A blockchain-based trust and reputation model resilient to forgery attacks for data sharing scenarios (RWS-BTRM)
-
An efficient and resilient IoT architecture for smart grids via quantum key distribution and multi-homocryption encryption
-
Space-frequency-based multichannel dual encryption for quantum color images using chaotic system and quantum walks
-
GCIF: graph based cross-modal information fusion for conversational emotion recognition
-
Multi-branch attention feature fusion network for person re-identification
-
Hybrid attention multi-scale feature aggregation for efficient nuclei segmentation and classification in H&E-stained images
-
Advancing cybersecurity in ASEAN: current trends, emerging challenges, and opportunities for enhanced resilience
-
Countering anti-forensic tactics in cybercrime investigations – a systematic literature review
-
Sequences, codes, and Boolean functions: in memory of Kai-Uwe Schmidt
-
Finite geometries