UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 602
21.
  • VINCENT: Cyber-threat detec... VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
    De Rose, Luca; Andresini, Giuseppina; Appice, Annalisa ... Computers & security, September 2024, 2024-09-00, Letnik: 144
    Journal Article
    Recenzirano
    Odprti dostop

    Vision Transformers (ViTs) denote a family of attention-based deep learning techniques that have recently achieved amazing results in various problems related to the field of computer vision. In this ...
Celotno besedilo
22.
  • Fuzzy-Taylor-elephant herd ... Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms
    Velliangiri, S.; Pandey, Hari Mohan Future generation computer systems, September 2020, 2020-09-00, Letnik: 110
    Journal Article
    Recenzirano
    Odprti dostop

    Cloud computing environment support resource sharing as cloud service over the internet. It enables the users to outsource data into the cloud server that can be accessed remotely from various ...
Celotno besedilo

PDF
23.
  • BFLS: Blockchain and Federa... BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
    Jiang, Tongtong; Shen, Guowei; Guo, Chun ... Computer networks (Amsterdam, Netherlands : 1999), April 2023, 2023-04-00, Letnik: 224
    Journal Article
    Recenzirano

    Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and collaborative manner. ...
Celotno besedilo
24.
  • Machine learning for enhanc... Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
    Alqahtani, Hamed; Kumar, Gulshan Engineering applications of artificial intelligence, March 2024, 2024-03-00, Letnik: 129
    Journal Article
    Recenzirano

    This paper delves into the transformative role of machine learning (ML) techniques in revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains such as predictive ...
Celotno besedilo
25.
  • Standoff spectroscopy via r... Standoff spectroscopy via remote generation of a backward-propagating laser beam
    Hemmer, Philip R; Miles, Richard B; Polynkin, Pavel ... Proceedings of the National Academy of Sciences - PNAS, 02/2011, Letnik: 108, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    In an earlier publication we demonstrated that by using pairs of pulses of different colors (e.g., red and blue) it is possible to excite a dilute ensemble of molecules such that lasing and/or ...
Celotno besedilo

PDF
26.
  • Contextual feature represen... Contextual feature representation for image-based insider threat classification
    Duan, Shu-Min; Yuan, Jian-Ting; Wang, Bo Computers & security, 20/May , Letnik: 140
    Journal Article
    Recenzirano

    With the rapid development of technology, insider threat incidents frequently occur in organizations. Detecting insider threats is an essential task in network infrastructure security. In this paper, ...
Celotno besedilo
27.
  • Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
    Jiang, Jianguo; Chen, Jiuming; Gu, Tianbo ... MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), 2019-Nov.
    Conference Proceeding

    Anomaly detection generally involves the extraction of features from entities' or users' properties, and the design of anomaly detection models using machine learning or deep learning algorithms. ...
Celotno besedilo
28.
  • No evidence of attentional ... No evidence of attentional prioritization for threatening targets in visual search
    Zsido, Andras N; Hout, Michael C; Hernandez, Marko ... Scientific reports, 03/2024, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Throughout human evolutionary history, snakes have been associated with danger and threat. Research has shown that snakes are prioritized by our attentional system, despite many of us rarely ...
Celotno besedilo
29.
  • Enhancing false negative an... Enhancing false negative and positive rates for efficient insider threat detection
    AlSlaiman, Muhanned; Salman, Mohammed I.; Saleh, Mariam M. ... Computers & security, March 2023, 2023-03-00, Letnik: 126
    Journal Article
    Recenzirano

    Insider threats on information security can become a burden for organizations. However, outsider attacks have received more attention compared to insider attacks. Many researchers studied insider ...
Celotno besedilo
30.
  • A comparative study of mach... A comparative study of machine learning methods for automated identification of radioisotopes using NaI gamma-ray spectra
    Galib, S.M.; Bhowmik, P.K.; Avachat, A.V. ... Nuclear engineering and technology, December 2021, 2021-12-00, 2021-12-01, Letnik: 53, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    This article presents a study on the state-of-the-art methods for automated radioactive material detection and identification, using gamma-ray spectra and modern machine learning methods. The recent ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 602

Nalaganje filtrov