DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

48 49 50
zadetkov: 628
491.
  • Privacy-Conscious Threat Intelligence Using DNSBLoom
    van Rijswijk-Deij, Roland; Rijnders, Gijs; Bomhoff, Matthijs ... 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019-April
    Conference Proceeding

    The Domain Name System (DNS) is an essential component of every interaction on the Internet. DNS translates human-readable names into machine readable IP addresses. Conversely, DNS requests provide a ...
Celotno besedilo
Dostopno za: UL
492.
  • Research and Evaluation of Intelligent Threat Detection Under Industrial Internet
    Wu, Linfeng; Ruan, Wei; Sun, Keda ... 2021 IEEE International Conference on Networking, Sensing and Control (ICNSC), 2021-Dec.-3, Letnik: 1
    Conference Proceeding

    At present, the security situation in the industrial internet is becoming more and more serious. Various threats such as network attacks, malicious code and vulnerability utilization are gradually ...
Celotno besedilo
Dostopno za: UL
493.
  • Multi-label Classification ... Multi-label Classification of Cybersecurity Text with Distant Supervision
    Ishii, Masahiro; Mori, Kento; Kuwana, Ryoichi ... Proceedings of the 17th International Conference on Availability, Reliability and Security, 08/2022
    Conference Proceeding

    Detailed analysis of cybersecurity intelligence in various data is essential to counter the recent advanced and complex evolution of cyber security attacks and threats. In particular, highly ...
Celotno besedilo
Dostopno za: UL
494.
  • Dynamic Insider Threat Detection Based on Adaptable Genetic Programming
    Le, Duc C.; Zincir-Heywood, A. Nur; Heywood, Malcolm I. 2019 IEEE Symposium Series on Computational Intelligence (SSCI), 2019-Dec.
    Conference Proceeding

    Different variations in deployment environments of machine learning techniques may affect the performance of the implemented systems. The variations may cause changes in the data for machine learning ...
Celotno besedilo
Dostopno za: UL
495.
  • The Mouseworld, a security ... The Mouseworld, a security traffic analysis lab based on NFV/SDN
    Pastor, Antonio; Mozo, Alberto; Lopez, Diego R. ... Proceedings of the 13th International Conference on Availability, Reliability and Security, 08/2018
    Conference Proceeding
    Odprti dostop

    Machine Learning (ML) technologies applied to Cybersecurity, especially in the area of network cyber threat detection, are a promising choice, but they require additional research in the ...
Celotno besedilo
Dostopno za: UL

PDF
496.
  • Automatic Permittivity Characterization of a Weak Dielectric Attached to Human Body Using Wideband Radar Image Processing
    Asri, Mahshid; Rappaport, Carey 2019 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, 2019-July
    Conference Proceeding

    This paper presents a new method for automatically determining the dielectric permittivity and thickness of a penetrable dielectric affixed to the human body by processing radar image responses. This ...
Celotno besedilo
Dostopno za: UL
497.
  • Research on Feature and Architecture Design of AI Firewall
    Wang, Zhijia 2021 5th Annual International Conference on Data Science and Business Analytics (ICDSBA), 2021-Sept.
    Conference Proceeding

    This paper analyzes the current network security environment and the shortcomings of firewall products in the current network environment, and expounds the benefits that can be brought by the ...
Celotno besedilo
Dostopno za: UL
498.
  • Automatic Threat Detection in Single, Stereo (Two) and Multi View X-Ray Images
    Tuli, Abhina; Bohra, Rohi; Moghe, Tanma ... 2020 IEEE 17th India Council International Conference (INDICON), 2020-Dec.-10
    Conference Proceeding

    Accurate X-ray screening systems are of paramount importance in the present day. Most existing systems predict only on the basis of a single image, which could lead to false positives and false ...
Celotno besedilo
Dostopno za: UL
499.
  • Insider Threat Detection using Deep Learning: A Review
    Raut, Madhu; Dhavale, Sunita; Singh, Amarjit ... 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020-Dec.-3
    Conference Proceeding

    A plethora of research is available for detecting and mitigating threats that occur across the organization's boundaries. However, Insider Threat Detection has only recently entered the limelight. It ...
Celotno besedilo
Dostopno za: UL
500.
  • Full Body Beamsteered Wi-Fi Imaging and Threat Classifier for Public Transportation
    Proffitt, Paul C.; Wang, Honggang 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 2019-Nov.
    Conference Proceeding

    With the population of the world increasing substantially decade after decade, the probability of terrorist attacks on people will increase. Detecting terrorists with dangerous objects is necessary. ...
Celotno besedilo
Dostopno za: UL

Dosegli ste najvišje možno število prikazanih rezultatov iskanja.

  • Zaradi večje učinkovitosti iskanje ponudi največ 1.000 rezultatov na poizvedbo (oz. 50 strani, če je izbrana možnost 10/stran).
  • Za nadaljnje pregledovanje rezultatov razmislite o uporabi filtrov rezultatov ali spremembi razvrstitve rezultatov.
48 49 50
zadetkov: 628

Nalaganje filtrov