UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

48 49 50
zadetkov: 602
491.
  • Automatic Threat Detection in Single, Stereo (Two) and Multi View X-Ray Images
    Tuli, Abhina; Bohra, Rohi; Moghe, Tanma ... 2020 IEEE 17th India Council International Conference (INDICON), 2020-Dec.-10
    Conference Proceeding

    Accurate X-ray screening systems are of paramount importance in the present day. Most existing systems predict only on the basis of a single image, which could lead to false positives and false ...
Celotno besedilo
492.
  • Insider Threat Detection using Deep Learning: A Review
    Raut, Madhu; Dhavale, Sunita; Singh, Amarjit ... 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020-Dec.-3
    Conference Proceeding

    A plethora of research is available for detecting and mitigating threats that occur across the organization's boundaries. However, Insider Threat Detection has only recently entered the limelight. It ...
Celotno besedilo
493.
  • A cybersecurity framework to guarantee reliability and trust for digital service chains - GUARD
    Repetto, Matteo; Duzha, Armend; Kolodziej, Joanna 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid)
    Conference Proceeding

    Evolving computing paradigms are progressively introducing new design, development, and operation models for digital services, which increasingly leverage service-oriented architectures and ...
Celotno besedilo
494.
  • Full Body Beamsteered Wi-Fi Imaging and Threat Classifier for Public Transportation
    Proffitt, Paul C.; Wang, Honggang 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 2019-Nov.
    Conference Proceeding

    With the population of the world increasing substantially decade after decade, the probability of terrorist attacks on people will increase. Detecting terrorists with dangerous objects is necessary. ...
Celotno besedilo
495.
Celotno besedilo

PDF
496.
  • Flow based analysis of Adva... Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing
    Vance, Andrew 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology, 2014-Oct.
    Conference Proceeding

    Cloud computing provides industry, government, and academic users' convenient and cost-effective access to distributed services and shared data via the Internet. Due to its distribution of diverse ...
Celotno besedilo
497.
  • Cyber-security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance Cameras
    Ahmadian, Saeed; Ebrahimi, Saba; Malki, Heidar 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021-Jan.-27
    Conference Proceeding

    Cyber-attacks toward cyber-physical systems are one of the main concerns of smart grid's operators. However, many of these cyber-attacks, are toward unmanned substations where the cyber-attackers ...
Celotno besedilo
498.
  • QTL: An efficient schedulin... QTL: An efficient scheduling policy for 10Gbps network intrusion detection system
    Bo Song; Weibing Yang; Mingyu Chen ... The IEEE symposium on Computers and Communications, 2010-June
    Conference Proceeding

    Broad network bandwidth and deep inspection impose great challenge for the capability of 10Gpbs network security monitoring. Proper scheduling policies can improve system capability without requiring ...
Celotno besedilo
499.
  • Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning
    Le, Duc C.; Zincir-Heywood, A. Nur 2018 IEEE Security and Privacy Workshops (SPW)
    Conference Proceeding
    Odprti dostop

    Insider threat is a prominent cyber-security danger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and ...
Celotno besedilo

PDF
500.
  • User Behaviour based Insider Threat Detection in Critical Infrastructures
    Singh, Malvika; Mehtre, BM; Sangeetha, S 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), 2021-May-21
    Conference Proceeding

    Cyber security is an important concern in critical infrastructures such as banking and financial organizations, where a number of malicious insiders are involved. These insiders may be existing ...
Celotno besedilo

Dosegli ste najvišje možno število prikazanih rezultatov iskanja.

  • Zaradi večje učinkovitosti iskanje ponudi največ 1.000 rezultatov na poizvedbo (oz. 50 strani, če je izbrana možnost 10/stran).
  • Za nadaljnje pregledovanje rezultatov razmislite o uporabi filtrov rezultatov ali spremembi razvrstitve rezultatov.
48 49 50
zadetkov: 602

Nalaganje filtrov