UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 582
11.
  • Machine learning techniques... Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
    Alwahedi, Fatima; Aldhaheri, Alyazia; Ferrag, Mohamed Amine ... Internet of Things and Cyber-Physical Systems, 2024, Letnik: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem ...
Celotno besedilo
12.
  • Unraveled — A semi-syntheti... Unraveled — A semi-synthetic dataset for Advanced Persistent Threats
    Myneni, Sowmya; Jha, Kritshekhar; Sabur, Abdulhakim ... Computer networks (Amsterdam, Netherlands : 1999), 20/May , Letnik: 227
    Journal Article
    Recenzirano
    Odprti dostop

    Unraveled is a novel cybersecurity dataset capturing Advanced Persistent Threat (APT) attacks not available in the public domain. Existing cybersecurity datasets lack coherent information about ...
Celotno besedilo
13.
Celotno besedilo
14.
  • mmCTD: Concealed Threat Det... mmCTD: Concealed Threat Detection for Cruise Ships Via Mmwave Radar
    Pei, Dashuai; Gong, Danei; Liu, Kezhong ... IEEE transactions on vehicular technology, 2024
    Journal Article
    Recenzirano

    The safeguarding of critical zones aboard a marine vehicle, such as the engine room, wheelhouse, and pump room, assumes crucial significance while navigating through the open sea. Despite the ...
Celotno besedilo
15.
  • FlowSpotter: Intelligent Io... FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows
    Tan, Shuaishuai; He, Daojing; Chan, Sammy ... IEEE network, 2024-July, Letnik: 38, Številka: 4
    Journal Article
    Recenzirano

    With the prevalence of Internet of Things (IoT) technologies, the huge growth of IoT devices has also brought attention of cyber attackers. IoT botnets are rapidly spreading and evolving worldwide, ...
Celotno besedilo
16.
  • E-Watcher: insider threat m... E-Watcher: insider threat monitoring and detection for enhanced security
    Wei, Zhiyuan; Rauf, Usman; Mohsen, Fadi Annales des télécommunications, 04/2024
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Insider threats refer to harmful actions carried out by authorized users within an organization, posing the most damaging risks. The increasing number of these threats has revealed the ...
Celotno besedilo
17.
  • Incremental convolutional t... Incremental convolutional transformer for baggage threat detection
    Hassan, Taimur; Hassan, Bilal; Owais, Muhammad ... Pattern recognition, September 2024, 2024-09-00, Letnik: 153
    Journal Article
    Recenzirano

    Detecting cluttered and overlapping contraband items from baggage scans is one of the most challenging tasks, even for human experts. Recently, considerable literature has grown up around the theme ...
Celotno besedilo
18.
  • A new approach to modelling... A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility
    Musuva, Paula M.W.; Getao, Katherine W.; Chepken, Christopher K. Computers in human behavior, 20/May , Letnik: 94
    Journal Article
    Recenzirano

    Phishing threats are real and are ever increasing in their reach and devastating effects. This study delves into the role of cognitive processing in detecting and curtailing phishing attacks. The ...
Celotno besedilo
19.
  • Machine learning for enhanc... Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
    Alqahtani, Hamed; Kumar, Gulshan Engineering applications of artificial intelligence, March 2024, 2024-03-00, Letnik: 129
    Journal Article
    Recenzirano

    This paper delves into the transformative role of machine learning (ML) techniques in revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains such as predictive ...
Celotno besedilo
20.
  • VINCENT: Cyber-threat detec... VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
    De Rose, Luca; Andresini, Giuseppina; Appice, Annalisa ... Computers & security, September 2024, 2024-09-00, Letnik: 144
    Journal Article
    Recenzirano
    Odprti dostop

    Vision Transformers (ViTs) denote a family of attention-based deep learning techniques that have recently achieved amazing results in various problems related to the field of computer vision. In this ...
Celotno besedilo
1 2 3 4 5
zadetkov: 582

Nalaganje filtrov