DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 733
1.
  • Modeling Threats to AI-ML S... Modeling Threats to AI-ML Systems Using STRIDE
    Mauri, Lara; Damiani, Ernesto Sensors, 09/2022, Letnik: 22, Številka: 17
    Journal Article
    Recenzirano
    Odprti dostop

    The application of emerging technologies, such as Artificial Intelligence (AI), entails risks that need to be addressed to ensure secure and trustworthy socio-technical infrastructures. Machine ...
Celotno besedilo
Dostopno za: UL
2.
  • Blockchain-Based Distribute... Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
    Bellini, Emanuele; Iraqi, Youssef; Damiani, Ernesto IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These features make the adoption of Blockchain ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • Ketogenic Diet in Neuromusc... Ketogenic Diet in Neuromuscular and Neurodegenerative Diseases
    Paoli, Antonio; Bianco, Antonino; Damiani, Ernesto ... BioMed research international, 01/2014, Letnik: 2014
    Journal Article
    Recenzirano
    Odprti dostop

    An increasing number of data demonstrate the utility of ketogenic diets in a variety of metabolic diseases as obesity, metabolic syndrome, and diabetes. In regard to neurological disorders, ketogenic ...
Celotno besedilo
Dostopno za: UL, VSZLJ

PDF
4.
  • XRecon: An Explainbale IoT ... XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning
    Alani, Mohammed M; Damiani, Ernesto Sensors, 06/2023, Letnik: 23, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    IoT devices have grown in popularity in recent years. Statistics show that the number of online IoT devices exceeded 35 billion in 2022. This rapid growth in adoption made these devices an obvious ...
Celotno besedilo
Dostopno za: UL
5.
  • Meta-Transfer Learning Driv... Meta-Transfer Learning Driven Tensor-Shot Detector for the Autonomous Localization and Recognition of Concealed Baggage Threats
    Hassan, Taimur; Shafay, Muhammad; Akçay, Samet ... Sensors, 11/2020, Letnik: 20, Številka: 22
    Journal Article
    Recenzirano
    Odprti dostop

    Screening baggage against potential threats has become one of the prime aviation security concerns all over the world, where manual detection of prohibited items is a time-consuming and hectic ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • A holistic and proactive ap... A holistic and proactive approach to forecasting cyber threats
    Almahmoud, Zaid; Yoo, Paul D; Alhussein, Omar ... Scientific reports, 05/2023, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware ...
Celotno besedilo
Dostopno za: UL
7.
  • Robust Computationally-Effi... Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks
    Almazrouei, Ebtesam; Gianini, Gabriele; Almoosa, Nawaf ... Sensors, 04/2021, Letnik: 21, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    This paper proposes a novel Deep Learning (DL)-based approach for classifying the radio-access technology (RAT) of wireless emitters. The approach improves computational efficiency and accuracy under ...
Celotno besedilo
Dostopno za: UL

PDF
8.
  • Explainable Artificial Inte... Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
    Zhang, Zhibo; Hamadi, Hussam Al; Damiani, Ernesto ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of ...
Celotno besedilo
Dostopno za: UL
9.
  • The Essentials: A Comprehen... The Essentials: A Comprehensive Survey to Get Started in Augmented Reality
    Haneefa, Fayaz Mohamed; Shoufan, Abdulhadi; Damiani, Ernesto IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Augmented Reality (AR) has experienced a significant resurgence in popularity and interest in recent years. Despite numerous surveys and reviews in the field, information remains scattered and ...
Celotno besedilo
Dostopno za: UL
10.
  • Empirical Studies of TESLA ... Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication
    Eledlebi, Khouloud; Yeun, Chan Yeob; Damiani, Ernesto ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    This study discusses the general overview of Timed Efficient Stream Loss-tolerant Authentication (TESLA) protocol, including its properties, key setups, and improvement protocols. The discussion ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 733

Nalaganje filtrov