„Network Coding“
Suchergebnisse
3.793 Treffer
-
CB-YOLO: composite dual backbone network for high-frequency transformer coding defect detection
-
Gaming the system: tetromino-based covert channel and its impact on mobile security
-
Acnn: arbitrary trace attacks based on leakage area detection
-
A dynamic C-V2X anonymous authentication and group key agreement protocol
-
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
-
A compliance-based ranking of certificate authorities using probabilistic approaches
-
IoT cybersecurity in 5G and beyond: a systematic literature review
-
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology
-
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
-
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms
-
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
-
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
-
Adaptive context-aware access control for IoT environments leveraging fog computing
-
Dynamic vulnerability severity calculator for industrial control systems
-
Expediting the design and development of secure cloud-based mobile apps
-
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
-
Multi-party codebook distribution strategy based on secret sharing
-
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
-
Resource allocation optimization in future wireless networks
-
Swarm-intelligence for the modern ICT ecosystems