UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 276
1.
  • Profiling and classifying t... Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun The Journal of systems and software, 02/2015, Letnik: 100
    Journal Article
    Recenzirano

    Malware is a major security threat confronting computer systems and networks and has increased in scale and impact from the early days of ICT. Traditional protection mechanisms are largely incapable ...
Celotno besedilo
2.
  • Deep Learning-Based Traffic... Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System
    Yu, Keping; Lin, Long; Alazab, Mamoun ... IEEE transactions on intelligent transportation systems, 2021-July, 2021-7-00, Letnik: 22, Številka: 7
    Journal Article
    Recenzirano

    It is expected that a mixture of autonomous and manual vehicles will persist as a part of the intelligent transportation system (ITS) for many decades. Thus, addressing the safety issues arising from ...
Celotno besedilo
3.
  • Image-Based malware classif... Image-Based malware classification using ensemble of CNN architectures (IMCEC)
    Vasan, Danish; Alazab, Mamoun; Wassan, Sobia ... Computers & security, 20/May , Letnik: 92
    Journal Article
    Recenzirano

    Both researchers and malware authors have demonstrated that malware scanners are unfortunately limited and are easily evaded by simple obfuscation techniques. This paper proposes a novel ensemble ...
Celotno besedilo
4.
  • Blockchain-Based Reliable a... Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices
    Wang, Weizheng; Xu, Hao; Alazab, Mamoun ... IEEE transactions on industrial informatics, 10/2022, Letnik: 18, Številka: 10
    Journal Article

    Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which brings tremendous associations with all ...
Celotno besedilo
5.
  • PMRSS: Privacy-Preserving M... PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
    Sun, Yi; Liu, Jie; Yu, Keping ... IEEE transactions on industrial informatics, 03/2022, Letnik: 18, Številka: 3
    Journal Article

    In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out ...
Celotno besedilo
6.
  • Blockchain for Industry 4.0... Blockchain for Industry 4.0: A Comprehensive Review
    Bodkhe, Umesh; Tanwar, Sudeep; Parekh, Karan ... IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Due to the proliferation of ICT during the last few decades, there is an exponential increase in the usage of various smart applications such as smart farming, smart healthcare, supply-chain & ...
Celotno besedilo

PDF
7.
  • Blockchain-Envisioned Secur... Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb; Saha, Sourav; Das, Ashok Kumar ... IEEE transactions on vehicular technology, 08/2020, Letnik: 69, Številka: 8
    Journal Article
    Recenzirano

    The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during communication either with the control ...
Celotno besedilo
8.
  • Deep Learning Approach for ... Deep Learning Approach for Intelligent Intrusion Detection System
    Vinayakumar, R.; Alazab, Mamoun; Soman, K. P. ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host-level in a timely and ...
Celotno besedilo

PDF
9.
  • Robust Intelligent Malware ... Robust Intelligent Malware Detection Using Deep Learning
    Vinayakumar, R.; Alazab, Mamoun; Soman, K. P. ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer users, corporations, and governments ...
Celotno besedilo

PDF
10.
  • The Use of Ensemble Models ... The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems
    Iwendi, Celestine; Khan, Suleman; Anajemba, Joseph Henry ... Sensors (Basel, Switzerland), 04/2020, Letnik: 20, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 276

Nalaganje filtrov