Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 426
1.
  • Anonymous Communication and... Anonymous Communication and Darknet Space Comprehensive Governance
    LAN Haoliang, LI Fujuan, WANG Qun, YIN Jie, XU Jie, HONG Lei, XUE Yishi, XIA Minghui Jisuanji kexue yu tansuo, 11/2022, Letnik: 16, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The characteristics of anonymous communication, such as difficulty in node discovery, service positio-ning, communication relationship confirmation, and user monitoring, make the darknet built on it ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
2.
  • The Ransomware-as-a-Service... The Ransomware-as-a-Service economy within the darknet
    Meland, Per Håkon; Bayoumy, Yara Fareed Fahmy; Sindre, Guttorm Computers & security, 20/May , Letnik: 92
    Journal Article
    Recenzirano
    Odprti dostop

    Ransomware is an epidemic that adversely affects the lives of both individuals and large companies, where criminals demand payments to release infected digital assets. In the wake of the ransomware ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
3.
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
4.
  • Detection of Militia Object... Detection of Militia Object in Libya by Using YOLO Transfer Learning
    Kristian, Yosi; Salim, Hatem Alsadeg Ali; Setyati, Endang Jurnal Teknologi dan Manajemen Informatika, 06/2020, Letnik: 6, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Humans can recognize and classify shapes, names, and provide responses to object that are received by visually quickly and accurately. More importantly, it is expected that the system created is able ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
5.
  • Exemplar pyramid deep featu... Exemplar pyramid deep feature extraction based cervical cancer image classification model using pap-smear images
    Yaman, Orhan; Tuncer, Turker Biomedical signal processing and control, March 2022, 2022-03-00, Letnik: 73
    Journal Article
    Recenzirano

    •Automated classification of the pap-smear image using exemplar pyramid deep feature extraction technique.•A shallow classifier(Cubic SVM) with high classification ability.•Two cervical cancer ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
  • A Prototype Design for a Fr... A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet
    International journal of innovative technology and exploring engineering, 7/2019, Letnik: 8, Številka: 6S4
    Journal Article
    Odprti dostop

    The malicious activities in the darknet are an emerging threat to the cyber space. Darknet sites operate using TOR(The Onion Router) hidden services which provides the feature of disguising the users ...
Celotno besedilo
Dostopno za: NUK, UL, UM

PDF
7.
  • CDBC: A novel data enhancem... CDBC: A novel data enhancement method based on improved between-class learning for darknet detection
    Song, Binjie; Chang, Yufei; Liao, Minxi ... Mathematical biosciences and engineering : MBE, 01/2023, Letnik: 20, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of the Internet, people have paid more attention to privacy protection, and privacy protection technology is widely used. However, it also breeds the darknet, which has become a ...
Celotno besedilo
Dostopno za: NUK, UL, UM
8.
  • SummCoder: An unsupervised ... SummCoder: An unsupervised framework for extractive text summarization based on deep auto-encoders
    Joshi, Akanksha; Fidalgo, E.; Alegre, E. ... Expert systems with applications, 09/2019, Letnik: 129
    Journal Article
    Recenzirano

    •An unsupervised text summarization framework based on deep neural networks.•Vector representation of sentences using recurrent neural networks.•Summary generated using three sentence features ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Darknet traffic classificat... Darknet traffic classification and adversarial attacks using machine learning
    Rust-Nguyen, Nhien; Sharma, Shruti; Stamp, Mark Computers & security, April 2023, 2023-04-00, Letnik: 127
    Journal Article
    Recenzirano
    Odprti dostop

    The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the detection of darknet ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • Functional classification o... Functional classification of bitcoin addresses
    Febrero-Bande, Manuel; González-Manteiga, Wenceslao; Prallon, Brenda ... Computational statistics & data analysis, 20/May , Letnik: 181
    Journal Article
    Recenzirano
    Odprti dostop

    A classification model for predicting the main activity of bitcoin addresses based on their balances is proposed. Since the balances are functions of time, methods from functional data analysis are ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
zadetkov: 426

Nalaganje filtrov