DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 628
21.
  • Machine learning for enhanc... Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
    Alqahtani, Hamed; Kumar, Gulshan Engineering applications of artificial intelligence, March 2024, 2024-03-00, Letnik: 129
    Journal Article
    Recenzirano

    This paper delves into the transformative role of machine learning (ML) techniques in revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains such as predictive ...
Celotno besedilo
Dostopno za: UL
22.
  • VINCENT: Cyber-threat detec... VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
    De Rose, Luca; Andresini, Giuseppina; Appice, Annalisa ... Computers & security, September 2024, 2024-09-00, Letnik: 144
    Journal Article
    Recenzirano
    Odprti dostop

    Vision Transformers (ViTs) denote a family of attention-based deep learning techniques that have recently achieved amazing results in various problems related to the field of computer vision. In this ...
Celotno besedilo
Dostopno za: UL
23.
  • Fuzzy-Taylor-elephant herd ... Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms
    Velliangiri, S.; Pandey, Hari Mohan Future generation computer systems, September 2020, 2020-09-00, Letnik: 110
    Journal Article
    Recenzirano
    Odprti dostop

    Cloud computing environment support resource sharing as cloud service over the internet. It enables the users to outsource data into the cloud server that can be accessed remotely from various ...
Celotno besedilo
Dostopno za: UL

PDF
24.
  • BFLS: Blockchain and Federa... BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
    Jiang, Tongtong; Shen, Guowei; Guo, Chun ... Computer networks (Amsterdam, Netherlands : 1999), April 2023, 2023-04-00, Letnik: 224
    Journal Article
    Recenzirano

    Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and collaborative manner. ...
Celotno besedilo
Dostopno za: UL
25.
  • Standoff spectroscopy via r... Standoff spectroscopy via remote generation of a backward-propagating laser beam
    Hemmer, Philip R; Miles, Richard B; Polynkin, Pavel ... Proceedings of the National Academy of Sciences - PNAS, 02/2011, Letnik: 108, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    In an earlier publication we demonstrated that by using pairs of pulses of different colors (e.g., red and blue) it is possible to excite a dilute ensemble of molecules such that lasing and/or ...
Celotno besedilo
Dostopno za: UL

PDF
26.
  • Contextual feature represen... Contextual feature representation for image-based insider threat classification
    Duan, Shu-Min; Yuan, Jian-Ting; Wang, Bo Computers & security, 20/May , Letnik: 140
    Journal Article
    Recenzirano

    With the rapid development of technology, insider threat incidents frequently occur in organizations. Detecting insider threats is an essential task in network infrastructure security. In this paper, ...
Celotno besedilo
Dostopno za: UL
27.
  • Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
    Jiang, Jianguo; Chen, Jiuming; Gu, Tianbo ... MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), 2019-Nov.
    Conference Proceeding

    Anomaly detection generally involves the extraction of features from entities' or users' properties, and the design of anomaly detection models using machine learning or deep learning algorithms. ...
Celotno besedilo
Dostopno za: UL
28.
  • Enhancing false negative an... Enhancing false negative and positive rates for efficient insider threat detection
    AlSlaiman, Muhanned; Salman, Mohammed I.; Saleh, Mariam M. ... Computers & security, March 2023, 2023-03-00, Letnik: 126
    Journal Article
    Recenzirano

    Insider threats on information security can become a burden for organizations. However, outsider attacks have received more attention compared to insider attacks. Many researchers studied insider ...
Celotno besedilo
Dostopno za: UL
29.
  • A comparative study of mach... A comparative study of machine learning methods for automated identification of radioisotopes using NaI gamma-ray spectra
    Galib, S.M.; Bhowmik, P.K.; Avachat, A.V. ... Nuclear engineering and technology, December 2021, 2021-12-00, 2021-12-01, Letnik: 53, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    This article presents a study on the state-of-the-art methods for automated radioactive material detection and identification, using gamma-ray spectra and modern machine learning methods. The recent ...
Celotno besedilo
Dostopno za: UL

PDF
30.
  • Cybersecurity in industrial... Cybersecurity in industrial control systems: Issues, technologies, and challenges
    Asghar, Muhammad Rizwan; Hu, Qinwen; Zeadally, Sherali Computer networks (Amsterdam, Netherlands : 1999), 12/2019, Letnik: 165
    Journal Article
    Recenzirano

    Industrial Control Systems (ICSs) play an important role in today’s industry by providing process automation, distributed control, and process monitoring. ICS was designed to be used in an isolated ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 628

Nalaganje filtrov