Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             44 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems Maaref, Zineb

27 C p.
artikel
2 Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches Ouhssini, Mohamed

27 C p.
artikel
3 Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing Ali, Sijjad

27 C p.
artikel
4 A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT Arshad, Jehangir

27 C p.
artikel
5 A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study Azam, M. Mehran Bin

27 C p.
artikel
6 A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine Yin, Ziming

27 C p.
artikel
7 A multi-dimensional framework for improving data reliability in mobile crowd sensing Wu, Xu

27 C p.
artikel
8 An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications Cui, Lichao

27 C p.
artikel
9 An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services Wang, Zhiqun

27 C p.
artikel
10 A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks Sedhuramalingam, K.

27 C p.
artikel
11 A proposed secure framework for protecting cloud-based educational systems from hacking El-Sofany, Hosam

27 C p.
artikel
12 A resilient image encryption scheme using Laplace transform Nawaz, Fariha

27 C p.
artikel
13 A single-individual based variable neighborhood search algorithm for the blocking hybrid flow shop group scheduling problem Peng, Zhongyuan

27 C p.
artikel
14 Blockchain-supported online banking scheme Tsai, Chien-Hua

27 C p.
artikel
15 BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method Ramadass, Parthasarathy

27 C p.
artikel
16 Classification and monitoring of arm exercises using machine learning and wrist-worn band Bilal Asghar, Aamer

27 C p.
artikel
17 Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique Jayapradha, J.

27 C p.
artikel
18 Data fusion for driver drowsiness recognition: A multimodal perspective Priyanka, S.

27 C p.
artikel
19 DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment Srinivasa Rao, Goda

27 C p.
artikel
20 Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion Almestekawy, Abdelwahab

27 C p.
artikel
21 Deep hybrid approach with sequential feature extraction and classification for robust malware detection Singh, Swapnil

27 C p.
artikel
22 DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain Mali, Satish D.

27 C p.
artikel
23 Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm Khan, Iliyas Karim

27 C p.
artikel
24 Digital forensics for the socio-cyber world (DF-SCW): A novel framework for deepfake multimedia investigation on social media platforms Ayub Khan, Abdullah

27 C p.
artikel
25 Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree Elmenyawi, Marwa A.

27 C p.
artikel
26 Enhanced threat intelligence framework for advanced cybersecurity resilience Alazab, Moutaz

27 C p.
artikel
27 Enhancing brain tumor segmentation in MRI images: A hybrid approach using UNet, attention mechanisms, and transformers Nguyen-Tat, Thien B.

27 C p.
artikel
28 Enhancing medical image classification via federated learning and pre-trained model Naga Srinivasu, Parvathaneni

27 C p.
artikel
29 Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance Yanzhuang, Xuan

27 C p.
artikel
30 IFC: Editorial
27 C p.
artikel
31 iLDA: A new dimensional reduction method for non-Gaussian and small sample size datasets Sudibyo, Usman

27 C p.
artikel
32 Implementation and test of a Device-Free localization system with a modified desync network protocol and a weighted k-nearest neighbor algorithm Sasiwat, Yoschanin

27 C p.
artikel
33 Improving intrusion detection using LSTM-RNN to protect drones’ networks Gamal, Menna

27 C p.
artikel
34 Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel Kumar, Arun

27 C p.
artikel
35 MC-ShuffleNetV2: A lightweight model for maize disease recognition Zhu, Shaoqiu

27 C p.
artikel
36 Multilevel thresholding Aerial image segmentation using comprehensive learning-based Snow ablation optimizer with double attractors Abd Elaziz, Mohamed

27 C p.
artikel
37 Prediction of one- and three-months yoga practices effect on chronic venous insufficiency based on machine learning classifiers Han, Xue

27 C p.
artikel
38 Proactive threat hunting to detect persistent behaviour-based advanced adversaries Bhardwaj, Akashdeep

27 C p.
artikel
39 Recognizing human activities with the use of Convolutional Block Attention Module Zakariah, Mohammed

27 C p.
artikel
40 ‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’ Dhana Shree, K.

27 C p.
artikel
41 Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches Kumari, T. Anitha

27 C p.
artikel
42 Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics Bhardwaj, Akashdeep

27 C p.
artikel
43 Vision-based initial localization of AGV and path planning with PO-JPS algorithm Wang, Zheng

27 C p.
artikel
44 YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information Xu, Shizhou

27 C p.
artikel
                             44 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland