標題: Titlebook: AI Applications in Cyber Security and Communication Networks; Proceedings of Ninth Chaminda Hewage,Liqaa Nawaf,Nishtha Kesswani Conference [打印本頁] 作者: ATE 時間: 2025-3-21 17:19
書目名稱AI Applications in Cyber Security and Communication Networks影響因子(影響力)
書目名稱AI Applications in Cyber Security and Communication Networks影響因子(影響力)學科排名
書目名稱AI Applications in Cyber Security and Communication Networks網(wǎng)絡(luò)公開度
書目名稱AI Applications in Cyber Security and Communication Networks網(wǎng)絡(luò)公開度學科排名
書目名稱AI Applications in Cyber Security and Communication Networks被引頻次
書目名稱AI Applications in Cyber Security and Communication Networks被引頻次學科排名
書目名稱AI Applications in Cyber Security and Communication Networks年度引用
書目名稱AI Applications in Cyber Security and Communication Networks年度引用學科排名
書目名稱AI Applications in Cyber Security and Communication Networks讀者反饋
書目名稱AI Applications in Cyber Security and Communication Networks讀者反饋學科排名
作者: meretricious 時間: 2025-3-21 20:44 作者: 搖擺 時間: 2025-3-22 00:43
2367-3370 held at Cardiff Metropolitan University, Cardiff, United Kin.This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metrop作者: 煩擾 時間: 2025-3-22 05:21
Hartmut Ernst,Jochen Schmidt,Gerd Beneken their impact on the security of mobile banking applications. Finally, the study aims to provide insights into the potential of behavioral biometrics to improve digital banking security in Saudi Arabia and suggests possible directions for future research.作者: gerrymander 時間: 2025-3-22 09:08 作者: fabricate 時間: 2025-3-22 13:17 作者: 假裝是我 時間: 2025-3-22 18:33 作者: 含鐵 時間: 2025-3-23 01:04 作者: abject 時間: 2025-3-23 02:47
https://doi.org/10.1007/978-3-658-25945-7d limitations within the existing solutions by critically examining prior studies. It emphasizes the requirement for novel strategies and answers to deal with the complex data integrity problems of shared data in cloud.作者: AVID 時間: 2025-3-23 09:08 作者: 溺愛 時間: 2025-3-23 12:48 作者: PHIL 時間: 2025-3-23 17:24
An RFP Dataset for Real, Fake, and Partially Fake Audio Detection,that the available detection models incur a markedly higher equal error rate (EER) when detecting PF audio instead of entirely fake audio. The lowest EER recorded was 25.42%. Therefore, we believe that creators of detection models must seriously consider using datasets like RFP that include PF and other types of fake audio.作者: Rebate 時間: 2025-3-23 18:16 作者: Analogy 時間: 2025-3-24 00:52 作者: Prosaic 時間: 2025-3-24 03:23
Embedding Ethics in Coding: A Software Engineering Approach to Data Security and Privacy in Event Merving as valuable best practices for application designers and developers in enabling the creation of GDPR compliant applications. Furthermore, this approach not only facilitates GDPR compliance but also instils a strong ethical commitment to data security and user privacy within application development in meeting these ongoing challenges.作者: 得意人 時間: 2025-3-24 09:03
https://doi.org/10.1007/978-981-97-3973-8Cyber Security; Privacy and Security; Artificial Intelligence; Communication Networks; ICCS 2023 Proceed作者: absolve 時間: 2025-3-24 14:09
978-981-97-3972-1The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: DAUNT 時間: 2025-3-24 17:47 作者: CRANK 時間: 2025-3-24 21:29
Hartmut Ernst,Jochen Schmidt,Gerd Benekenl biometrics. This research focuses on implementing behavioral biometrics in digital banks in Saudi Arabia, where the market is rapidly growing. The study examines the advantages and disadvantages of this authentication method and evaluates its performance measures, including false acceptance rate (作者: 破裂 時間: 2025-3-24 23:43
,H?here Programmiersprachen und C,sidered in the digital version of security management. The aim of this research is to design and develop an efficient framework with security management (SM) and incidence response (IR) for securing autonomous transportation services (ATS). In the SM and IR, the quality of secure ATS and quickness w作者: 聲音刺耳 時間: 2025-3-25 06:19
Hartmut Ernst,Jochen Schmidt,Gerd Benekentationally efficient IDS solutions compatible with systems constrained by limited computing and storage resources. One way to achieve this is to use feature selection methods to reduce computational costs. However, selecting a subset of features introduces a potential vulnerability, allowing adversa作者: 條街道往前推 時間: 2025-3-25 11:28 作者: 過于光澤 時間: 2025-3-25 12:43 作者: Adrenal-Glands 時間: 2025-3-25 16:49 作者: 虛情假意 時間: 2025-3-25 21:53
Grundkurs Informatik – Das übungsbuchzed, curated, and deposited in public and private container image repositories. Such an arrangement facilitates agile and accelerated software engineering. However, for the containerization paradigm to achieve the widely articulated success, there is a need for container orchestration platform solut作者: Oafishness 時間: 2025-3-26 00:47 作者: encyclopedia 時間: 2025-3-26 04:47 作者: MEAN 時間: 2025-3-26 11:45
https://doi.org/10.1007/978-3-663-10208-3dynamic security and are vulnerable to visual and statistical attacks. Therefore, secret information should be disseminated throughout the cover audio to withstand these attacks. To solve this issue, the Block-based Chaotic Multi-level Least Significant Bit (BCM-LSB), which comprises two elements: b作者: 擦掉 時間: 2025-3-26 13:13 作者: 獨輪車 時間: 2025-3-26 19:56 作者: 脫離 時間: 2025-3-26 22:09 作者: 兇兆 時間: 2025-3-27 03:35
Einfache Datentypen und Variablen,ate of adoption and diffusion of these technologies as individuals had to adjust their lives and create new ways of working. However, despite their enormous utility, e.g. in entertainment, home security, care homes, supply chain, and logistics, they pose security and privacy threats. Thus, users are作者: capsule 時間: 2025-3-27 06:45
Netzwerkkommunikation mit TCP/IP,igital technologies has significantly changed security perspectives and increased the risk of cyberthreats. The nature of cyberthreats and attacks has changed, and cyberattacks are now more frequent, complex, and target-orientated. At the same time, many businesses still lack the necessary knowledge作者: 分貝 時間: 2025-3-27 10:04 作者: Kinetic 時間: 2025-3-27 13:58
https://doi.org/10.1007/978-3-658-43574-5shing attempts. Although the current research trends in phishing email detection have been covered in several review articles, it is important to tackle this problem from many perspectives. Except for one survey that briefly mentioned employing Natural Language Processing (NLP) algorithms for catego作者: 厚顏 時間: 2025-3-27 19:04 作者: Engaging 時間: 2025-3-27 22:26 作者: 放大 時間: 2025-3-28 02:13 作者: 瑣碎 時間: 2025-3-28 06:16
An RFP Dataset for Real, Fake, and Partially Fake Audio Detection,ogies to conduct attacks such as phishing. Numerous public datasets have been created to facilitate the development of effective detection models. However, available datasets contain only entirely fake audio; therefore, detection models may miss attacks that replace a short section of the real audio作者: Motilin 時間: 2025-3-28 12:05 作者: 友好 時間: 2025-3-28 17:46 作者: Militia 時間: 2025-3-28 20:19
,An Innovative Feature Selection Approach for?CAN Bus Data Leveraging Constant Value Analysis,tationally efficient IDS solutions compatible with systems constrained by limited computing and storage resources. One way to achieve this is to use feature selection methods to reduce computational costs. However, selecting a subset of features introduces a potential vulnerability, allowing adversa作者: Vo2-Max 時間: 2025-3-29 01:59 作者: 按時間順序 時間: 2025-3-29 04:39 作者: Perennial長期的 時間: 2025-3-29 09:45
,Security Perspectives in Integrity Verification for Shared Data in Cloud—A Survey, order to study the new security perspectives in the context of integrity verification for shared data in the cloud, this research article conducts an extensive examination of the existing solutions. A key component of cloud security, data integrity, is thoroughly examined with an emphasis on the di作者: Desert 時間: 2025-3-29 15:06 作者: 上漲 時間: 2025-3-29 17:30 作者: 冬眠 時間: 2025-3-29 21:28
,A Review on?Privacy Enhanced Distributed ML Against Poisoning Attacks, better increase the size of training data, it is necessary to distribute the machine learning workload to different nodes. Such learning systems are referred to as distributed learning systems. With the advancement of machine learning, processing all the data on a single server has become challengi作者: scotoma 時間: 2025-3-30 02:05 作者: puzzle 時間: 2025-3-30 06:06
A Genetic-Muted Leader Scheme with CNN-Based IDS for Industrial Internet of Things Networks,of Things (IIoT) has established a large network due to the sheer volume of information and linked equipment. IIoT networks are made to be vulnerable in terms of cybersecurity. So as to ensure the security of the IIoT networks, intrusion detection systems (IDS) must be developed. This study suggests作者: prostatitis 時間: 2025-3-30 08:34
The Practical Approaches of Datasets in Machine Learning,nd unite scholars around common research concerns. Despite the crucial function of dynamics of benchmark dataset use and reuse in the field of machine learning allows the field of using benchmark datasets in reality. This paper delves into these dynamics of the usage of datasets in machine learning.作者: 粗魯?shù)娜?nbsp; 時間: 2025-3-30 16:24
Embedding Ethics in Coding: A Software Engineering Approach to Data Security and Privacy in Event Mhannels as part of a new era in business, there has been limited exploration of integrating such compliance into software requirements, design, and development processes. Recent studies have begun to explore software engineering methodologies to capture and implement GDPR regulations. This research 作者: INCH 時間: 2025-3-30 18:08 作者: habitat 時間: 2025-3-30 23:25
,Creating an?Adaptive Defense Architecture Using an?Adaptive Honeypot Algorithm and?Network Traffic igital technologies has significantly changed security perspectives and increased the risk of cyberthreats. The nature of cyberthreats and attacks has changed, and cyberattacks are now more frequent, complex, and target-orientated. At the same time, many businesses still lack the necessary knowledge作者: 左右連貫 時間: 2025-3-31 03:18 作者: 發(fā)怨言 時間: 2025-3-31 06:49 作者: 虛度 時間: 2025-3-31 10:22 作者: Bravado 時間: 2025-3-31 14:08
Hartmut Ernst,Jochen Schmidt,Gerd Benekener of trained parameters, false positives, false negatives, and F1-score. We illustrate how our approach effectively addresses the risks associated with adversaries exploiting unselected features. Experimental results demonstrate that our approach reduces the number of trained parameters by approxim作者: 方便 時間: 2025-3-31 17:51 作者: 征兵 時間: 2025-3-31 22:24 作者: 最初 時間: 2025-4-1 05:32 作者: 圓木可阻礙 時間: 2025-4-1 07:59
Grundkurs Informatik – Das übungsbuchThis is a review paper focused on various security mechanisms for enhancing security in distributed ML systems. Privacy-preserving distributed learning mainly focuses on some basic cryptographic techniques. Among these methods, the hybrid method of encryption is used as the most suitable method. Due