找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Yassine Maleh,Youssef Baddi,Imed Romdhani Book 2021 The Edit

[復制鏈接]
樓主: 候選人名單
21#
發(fā)表于 2025-3-25 06:00:25 | 只看該作者
A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technolcious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.
22#
發(fā)表于 2025-3-25 10:27:31 | 只看該作者
A Framework Using Artificial Intelligence for Vision-Based Automated Firearm Detection and Reportinge 3rd person or agency about the incident. It can also manually highlight any object in a frame to keep track of its movement for security purposes. Machine and Deep Learning techniques were used to train models for object detection and facial recognition. The model achieved an accuracy of 97.33% in object detection and 90% in facial recognition.
23#
發(fā)表于 2025-3-25 11:54:22 | 只看該作者
24#
發(fā)表于 2025-3-25 18:49:36 | 只看該作者
2197-6503 uture cybersecurity applications.Proposes new models, practi.This book presents state-of-the-art?research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial?intelligence and blockchain challenges, mode
25#
發(fā)表于 2025-3-25 23:58:38 | 只看該作者
26#
發(fā)表于 2025-3-26 02:51:06 | 只看該作者
27#
發(fā)表于 2025-3-26 07:10:58 | 只看該作者
Towards Sustainable Land Use in Asiak would be in encrypted form to avoid the possibility of data manipulation or access by an unauthentic user. The IDS system is capable to trace attacks of different categories as the random classifier has classified the attacks.
28#
發(fā)表于 2025-3-26 11:50:41 | 只看該作者
29#
發(fā)表于 2025-3-26 15:02:28 | 只看該作者
30#
發(fā)表于 2025-3-26 16:53:49 | 只看該作者
Classification of Cyber Security Threats on Mobile Devices and Applicationsapplications-cyber security threat classifications, which includes most cyber threats classification and principles. The main purpose of our framework is to systematically identify cyber security threats, show their potential impacts, draw the mobile users’ attention to those threats, and enable them to take protective actions as appropriate.
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 03:06
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
鲜城| 唐海县| 叙永县| 枣强县| 井冈山市| 伊宁市| 鄂伦春自治旗| 乌拉特后旗| 平武县| 波密县| 禹州市| 合江县| 察隅县| 金湖县| 枣强县| 桑植县| 凤山市| 安康市| 佛坪县| 临泉县| 攀枝花市| 宜章县| 苗栗县| 岱山县| 宜川县| 西充县| 大余县| 光山县| 兰溪市| 天长市| 汝南县| 和政县| 大庆市| 汉源县| 大名县| 精河县| 宝清县| 富阳市| 湖南省| 太湖县| 阳原县|