UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

46 47 48 49 50
zadetkov: 58.963
471.
  • Malware Detection: Issues a... Malware Detection: Issues and Challenges
    Naseer, Muchammad; Rusdi, Jack Febrian; Shanono, Nuruddeen Musa ... Journal of physics. Conference series, 04/2021, Letnik: 1807, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Malware is a severe threat that makes computer security more vulnerable. Many studies have been conducted to improve the capability of detection techniques. However, there is a lack of ...
Celotno besedilo

PDF
472.
  • Big data analytics in medic... Big data analytics in medical engineering and healthcare: methods, advances and challenges
    Wang, Lidong; Alexander, Cheryl Ann Journal of medical engineering & technology, 08/2020, Letnik: 44, Številka: 6
    Journal Article
    Recenzirano

    Big data analytics are gaining popularity in medical engineering and healthcare use cases. Stakeholders are finding big data analytics reduce medical costs and personalise medical services for each ...
Celotno besedilo
473.
  • A Survey of IoT-Enabled Cyb... A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services
    Stellios, Ioannis; Kotzanikolaou, Panayiotis; Psarakis, Mihalis ... IEEE Communications surveys and tutorials, 01/2018, Letnik: 20, Številka: 4
    Journal Article
    Recenzirano

    As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no surprise that many recent cyber attacks are IoT-enabled : the attacker initially exploits some vulnerable ...
Celotno besedilo
474.
  • An application of DEMATEL a... An application of DEMATEL and fuzzy DEMATEL to evaluate the interaction of safety management system and cybersecurity management system in automated vehicles
    Khatun, Marzana; Wagner, Florence; Jung, Rolf ... Engineering applications of artificial intelligence, September 2023, 2023-09-00, Letnik: 124
    Journal Article
    Recenzirano
    Odprti dostop

    To ensure the safety and security of Automated Vehicles (Avs), the interaction between the Functional Safety (FuSa) and the Cybersecurity (CS) domains needs to be managed systematically. There is a ...
Celotno besedilo
475.
  • Cyber Security through Bloc... Cyber Security through Blockchain Technology
    Mathew, Alex. R. International journal of engineering and advanced technology, 10/2019, Letnik: 9, Številka: 1
    Journal Article
    Odprti dostop

    Blockchain technology has seen adoption in many industries and most predominantly in finance through the use of cryptocurrencies. However, the technology is viable in cybersecurity. This paper looked ...
Celotno besedilo

PDF
476.
  • A Learning-Based Framework ... A Learning-Based Framework for Detecting Cyber-Attacks Against Line Current Differential Relays
    Ameli, Amir; Ayad, Abdelrahman; El-Saadany, Ehab F. ... IEEE transactions on power delivery, 08/2021, Letnik: 36, Številka: 4
    Journal Article
    Recenzirano

    Technical developments in communication technology and measurement synchronization have facilitated the design of advanced protection schemes, such as Line Current Differential Relays (LCDRs). ...
Celotno besedilo
477.
  • A Survey of Intrusion Detec... A Survey of Intrusion Detection for In-Vehicle Networks
    Wu, Wufei; Li, Renfa; Xie, Guoqi ... IEEE transactions on intelligent transportation systems, 2020-March, 2020-3-00, Letnik: 21, Številka: 3
    Journal Article
    Recenzirano

    The development of the complexity and connectivity of modern automobiles has caused a massive rise in the security risks of in-vehicle networks (IVNs). Nevertheless, existing IVN designs (e.g., ...
Celotno besedilo
478.
  • Requirements for cybersecur... Requirements for cybersecurity in agricultural communication networks
    Nikander, Jussi; Manninen, Onni; Laajalahti, Mikko Computers and electronics in agriculture, December 2020, 2020-12-00, 20201201, Letnik: 179
    Journal Article
    Recenzirano
    Odprti dostop

    •Examination of six dairy farms uncovered significant problems in farm cybersecurity.•Systematic evaluation of the farms was used as a method.•Farmers considered cyber security important, and did not ...
Celotno besedilo

PDF
479.
  • Application of cognitive co... Application of cognitive computing in healthcare, cybersecurity, big data and IoT: A literature review
    Sreedevi, A.G.; Nitya Harshitha, T.; Sugumaran, Vijayan ... Information processing & management, March 2022, 2022-03-00, 20220301, Letnik: 59, Številka: 2
    Journal Article
    Recenzirano

    •A comprehensive overview reflecting the emergence of Cognitive Computing (CC) and functional features of CC-based frameworks.•Identifies, summarizes, and analyses existing CC approaches in the areas ...
Celotno besedilo
480.
  • Where Is Current Research o... Where Is Current Research on Blockchain Technology?-A Systematic Review
    Yli-Huumo, Jesse; Ko, Deokyoon; Choi, Sujin ... PloS one, 10/2016, Letnik: 11, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was ...
Celotno besedilo

PDF
46 47 48 49 50
zadetkov: 58.963

Nalaganje filtrov