派博傳思國(guó)際中心

標(biāo)題: Titlebook: Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Yassine Maleh,Youssef Baddi,Imed Romdhani Book 2021 The Edit [打印本頁(yè)]

作者: 候選人名單    時(shí)間: 2025-3-21 17:50
書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications影響因子(影響力)




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications影響因子(影響力)學(xué)科排名




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications網(wǎng)絡(luò)公開(kāi)度




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications被引頻次




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications被引頻次學(xué)科排名




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications年度引用




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications年度引用學(xué)科排名




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications讀者反饋




書目名稱Artificial Intelligence and Blockchain for Future Cybersecurity Applications讀者反饋學(xué)科排名





作者: languid    時(shí)間: 2025-3-21 22:20
Securing Vehicular Network Using AI and Blockchain-Based Approachescome a universal solicitude. Vehicular communication aims to provide secure communication and reduce the cost of traffic congestion by processing real-time data. This proliferation paradigm of vehicular systems represents several options for communication such as message sharing and data transmissio
作者: 陪審團(tuán)每個(gè)人    時(shí)間: 2025-3-22 02:53

作者: 培養(yǎng)    時(shí)間: 2025-3-22 05:56
Blockchain for Cybersecurity in IoTchnologies is paramount and especially for businesses and institutions, also IoT considered?as the engine of smart?cities?because it can?be applied in different smart city services to facilitate the human daily lifestyle. However, this evolution brings cybersecurity challenges. Thus,?security and pr
作者: 帶傷害    時(shí)間: 2025-3-22 10:07

作者: 悲痛    時(shí)間: 2025-3-22 16:41
Classification of Cyber Security Threats on Mobile Devices and Applicationsal need to understand all cyber threats characteristics in order to prevent their risks. However, most of cyber threats classifications are usually limited and based on one or two criteria in the classification process of threats. In addition, the current frameworks did not present an exhaustive lis
作者: 拱形大橋    時(shí)間: 2025-3-22 19:33
Revisiting the Approaches, Datasets and Evaluation Parameters to Detect Android Malware: A Comparatievelop malware for android devices. In addition, malware authors are trying to make malicious android applications that severely undermine the potential of traditional malware detectors. The key purpose of the chapter is to analyze and have a different appearance at various techniques of Android mal
作者: 信徒    時(shí)間: 2025-3-22 23:47
IFIFDroid: Important Features Identification Framework in Android Malware Detectionon point by attackers now-a-days. Thus, android malware detection has become a major field of investigation among the researchers and academicians who are working with in the field of cyber security. As there are lots of research works have done already, it is still major matter of concern to improv
作者: COST    時(shí)間: 2025-3-23 03:36

作者: interrogate    時(shí)間: 2025-3-23 08:12
Improved Secure Intrusion Detection System by User-Defined Socket and Random Forest Classifierstealing activities. Existing research in the field of the IDS system has been considered. The model has been developed to send and receive data. The IDS system is proposed to detect, classify the intrusion with the integration of the Random forest algorithm. The socket programming has been used to
作者: malapropism    時(shí)間: 2025-3-23 10:40
Spark Based Intrusion Detection System Using Practical Swarm Optimization Clusterings to discover attacks from such networks. This paper proposes a new Spark based intrusion detection system using particle swarm optimization clustering, referred to as IDS-SPSO, for large scale data able to provide good tradeoff between scalability and accuracy. The use of Particle swarm optimizatio
作者: 具體    時(shí)間: 2025-3-23 15:50
A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technolhare sensitive data across multiple sensor nodes, smart devices and transceivers. These sensitive data in WSNs environment is susceptible to various cyber-attacks and threats. Therefore, an efficient security mechanism is needed to handle threats, attacks and security challenges in WSNs. This paper
作者: Heresy    時(shí)間: 2025-3-23 18:48

作者: Palpitation    時(shí)間: 2025-3-23 23:49
Automated Methods for Detection and Classification Pneumonia Based on X-Ray Images Using Deep Learniocess hundreds of X-Ray and Computed Tomography (CT) images to accelerate the diagnosis of pneumonia such as SARS, covid-19, etc., and aid in its containment. Medical image analysis is one of the most promising research areas; it provides facilities for diagnosis and making decisions of several dise
作者: 過(guò)多    時(shí)間: 2025-3-24 02:30

作者: MAL    時(shí)間: 2025-3-24 08:03

作者: esthetician    時(shí)間: 2025-3-24 11:30

作者: 大約冬季    時(shí)間: 2025-3-24 15:46
https://doi.org/10.1007/978-981-10-5927-8cious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.
作者: Bumble    時(shí)間: 2025-3-24 23:02
Urban Land Use Land Cover Changee 3rd person or agency about the incident. It can also manually highlight any object in a frame to keep track of its movement for security purposes. Machine and Deep Learning techniques were used to train models for object detection and facial recognition. The model achieved an accuracy of 97.33% in object detection and 90% in facial recognition.
作者: Resign    時(shí)間: 2025-3-25 01:05

作者: 嚴(yán)厲譴責(zé)    時(shí)間: 2025-3-25 06:00
A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technolcious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.
作者: 咯咯笑    時(shí)間: 2025-3-25 10:27
A Framework Using Artificial Intelligence for Vision-Based Automated Firearm Detection and Reportinge 3rd person or agency about the incident. It can also manually highlight any object in a frame to keep track of its movement for security purposes. Machine and Deep Learning techniques were used to train models for object detection and facial recognition. The model achieved an accuracy of 97.33% in object detection and 90% in facial recognition.
作者: 冷淡一切    時(shí)間: 2025-3-25 11:54

作者: 跑過(guò)    時(shí)間: 2025-3-25 18:49
2197-6503 uture cybersecurity applications.Proposes new models, practi.This book presents state-of-the-art?research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial?intelligence and blockchain challenges, mode
作者: 免除責(zé)任    時(shí)間: 2025-3-25 23:58

作者: 畸形    時(shí)間: 2025-3-26 02:51

作者: muscle-fibers    時(shí)間: 2025-3-26 07:10
Towards Sustainable Land Use in Asiak would be in encrypted form to avoid the possibility of data manipulation or access by an unauthentic user. The IDS system is capable to trace attacks of different categories as the random classifier has classified the attacks.
作者: NOCT    時(shí)間: 2025-3-26 11:50

作者: Picks-Disease    時(shí)間: 2025-3-26 15:02

作者: 辭職    時(shí)間: 2025-3-26 16:53
Classification of Cyber Security Threats on Mobile Devices and Applicationsapplications-cyber security threat classifications, which includes most cyber threats classification and principles. The main purpose of our framework is to systematically identify cyber security threats, show their potential impacts, draw the mobile users’ attention to those threats, and enable them to take protective actions as appropriate.
作者: debouch    時(shí)間: 2025-3-27 00:02

作者: freight    時(shí)間: 2025-3-27 04:48

作者: Anhydrous    時(shí)間: 2025-3-27 09:18

作者: 發(fā)牢騷    時(shí)間: 2025-3-27 12:43
2197-6503 erse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications..978-3-030-74577-6978-3-030-74575-2Series ISSN 2197-6503 Series E-ISSN 2197-6511
作者: 案發(fā)地點(diǎn)    時(shí)間: 2025-3-27 16:27
https://doi.org/10.1007/978-3-319-50032-4e more digital systems are adopted and services provided by these industries, the greater the risk of hacking these systems. Combining blockchain power and artificial intelligence can provide a strong shield against these attacks and security threats. In this chapter, we will study the convergence o
作者: 火花    時(shí)間: 2025-3-27 20:47
Topics in Biodiversity and Conservationintelligence (AI) and blockchain technology, researchers have solved vehicular network-related security problems using those technologies separately and combinedly as well. The common security concerns include Sybil attacks, Denial-of-service (DoS) attacks, man-in-the-middle (MITM) attacks, maliciou
作者: 不適    時(shí)間: 2025-3-28 01:04

作者: 一小塊    時(shí)間: 2025-3-28 06:08
https://doi.org/10.1007/978-3-319-19393-9forests, support vector machines, logistic model trees, and artificial neural networks, also Deep learning techniques. It is a comparative analysis that should be useful in this field for researchers. The analysis shows, based on simple criteria, the similarities and differences in essential publish
作者: EWE    時(shí)間: 2025-3-28 08:12

作者: 抑制    時(shí)間: 2025-3-28 14:00

作者: Coronation    時(shí)間: 2025-3-28 17:48
Urban Land Use Land Cover Changeages (4504 pneumonia and 1583 normal). As a result, we can conclude that the fine-tuned version of Resnet50 shows highly satisfactory performance with rate of increase in training and testing accuracy (more than 96% of accuracy).
作者: Spongy-Bone    時(shí)間: 2025-3-28 20:05

作者: 的染料    時(shí)間: 2025-3-28 22:54
https://doi.org/10.1007/978-3-031-38801-9fying the type of crime. Na?ve Bayes classification algorithm is used to classify the crime into subcategories of classes with geographical factors, and temporal factors from RSS feeds. Mallet package is used for extracting the keywords from the newsfeeds. K-means algorithm is used to identify the h
作者: 猜忌    時(shí)間: 2025-3-29 04:17
Artificial Intelligence and Blockchain for Future Cybersecurity Applications
作者: 夾克怕包裹    時(shí)間: 2025-3-29 10:06

作者: Fierce    時(shí)間: 2025-3-29 14:27
Securing Vehicular Network Using AI and Blockchain-Based Approachesintelligence (AI) and blockchain technology, researchers have solved vehicular network-related security problems using those technologies separately and combinedly as well. The common security concerns include Sybil attacks, Denial-of-service (DoS) attacks, man-in-the-middle (MITM) attacks, maliciou
作者: 印第安人    時(shí)間: 2025-3-29 16:17
Privacy-Preserving Multivariant Regression Analysis over Blockchain-Based Encrypted IoMT Datad any trusted third-party. It requires only three interplays in each iteration. Severe security inquiry proves that secure linear regression preserves sensitive data privacy for each data provider and analyst. The secure linear regression achieved 0.78, 0.066, and 0.196 adjusted . on BCWD, HDD, and
作者: DEMUR    時(shí)間: 2025-3-29 21:51

作者: Scintigraphy    時(shí)間: 2025-3-30 02:23

作者: 警告    時(shí)間: 2025-3-30 05:20
AntiPhishTuner: Multi-level Approaches Focusing on Optimization by Parameters Tuning in Phishing URL mean squared error (MSE) 0.30, and also a mean absolute error (MAE) 0.074 where the number of epochs was 50 and Adam optimizer as an optimizer. Using two-layer NN with AdaGard optimizer can provide accuracy of 0.95, with MSE 0.30 and MAE 0.074. NN provides these results with 150 epochs. Stack gener
作者: 啜泣    時(shí)間: 2025-3-30 11:20

作者: AMOR    時(shí)間: 2025-3-30 14:01
Using Blockchain in Autonomous Vehiclested industries. This paper suggests directions for improvement in the sectors of Autonomous Vehicles (AV), which can be achieved with the incorporation of blockchain into Intelligent Transport Systems (ITS) or individual vehicular units.
作者: 離開(kāi)    時(shí)間: 2025-3-30 18:29

作者: 放氣    時(shí)間: 2025-3-30 22:48
https://doi.org/10.1007/978-3-319-50032-4cations like healthcare, data access and processing in real-time among various information systems is a bottleneck. Blockchain’s decentralized database architecture, secure storage, authentication, and data sharing would offer a solution to this problem. Besides, Artificial Intelligence can live at
作者: 開(kāi)玩笑    時(shí)間: 2025-3-31 03:23

作者: Creatinine-Test    時(shí)間: 2025-3-31 05:02

作者: 開(kāi)頭    時(shí)間: 2025-3-31 11:27
https://doi.org/10.1007/978-3-030-35675-0chnologies is paramount and especially for businesses and institutions, also IoT considered?as the engine of smart?cities?because it can?be applied in different smart city services to facilitate the human daily lifestyle. However, this evolution brings cybersecurity challenges. Thus,?security and pr
作者: 淘氣    時(shí)間: 2025-3-31 14:52

作者: 兵團(tuán)    時(shí)間: 2025-3-31 20:47

作者: 鞠躬    時(shí)間: 2025-4-1 01:09

作者: 議程    時(shí)間: 2025-4-1 02:21
Management and Industrial Engineeringon point by attackers now-a-days. Thus, android malware detection has become a major field of investigation among the researchers and academicians who are working with in the field of cyber security. As there are lots of research works have done already, it is still major matter of concern to improv
作者: DOLT    時(shí)間: 2025-4-1 07:27
Management and Industrial Engineeringansformations of web service, the reliance on the web has increased day by day. Security threats have emerged due to the increasing reliance on online orientation. There are many types of anti-phishing solutions available that have been proposed by many researchers. However, this chapter is to propo




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
德庆县| 独山县| 鄂伦春自治旗| 泰宁县| 安平县| 军事| 昭通市| 阿克| 秭归县| 元江| 泊头市| 依兰县| 隆德县| 太康县| 南开区| 金阳县| 宿迁市| 雷州市| 新余市| 渝北区| 大埔县| 墨竹工卡县| 富顺县| 桐柏县| 天柱县| 安国市| 贵德县| 舒兰市| 永康市| 武宁县| 洛川县| 盈江县| 宽甸| 安溪县| 洞头县| 吉水县| 南雄市| 会昌县| 特克斯县| 两当县| 柯坪县|