標(biāo)題: Titlebook: Illumination of Artificial Intelligence in Cybersecurity and Forensics; Sanjay Misra,Chamundeswari Arumugam Book 2022 The Editor(s) (if ap [打印本頁] 作者: 萬靈藥 時間: 2025-3-21 16:16
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics影響因子(影響力)
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics影響因子(影響力)學(xué)科排名
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics網(wǎng)絡(luò)公開度
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics被引頻次
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics被引頻次學(xué)科排名
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics年度引用
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics年度引用學(xué)科排名
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics讀者反饋
書目名稱Illumination of Artificial Intelligence in Cybersecurity and Forensics讀者反饋學(xué)科排名
作者: 刺激 時間: 2025-3-21 23:38
A Practical Experience Applying Security Audit Techniques in An Industrial Healthcare System,ed as possible. The results of this study include a security audit on an industrial scenario currently in production. An exploitation and vulnerability analysis has been performed, and more that 450 vulnerabilities has been found. This chapter outlines a systematic approach using artificial intellig作者: 搬運工 時間: 2025-3-22 00:52 作者: 逢迎春日 時間: 2025-3-22 07:42
Intrusion Detection Using Anomaly Detection Algorithm and Snort,r simplicity in classification. The result shows the outlier value for each item considered; a 1 depicts an attack, a 0 depicts normalcy. The results are promising in dictating intrusion and anomalies in an IDS system.作者: Nibble 時間: 2025-3-22 10:02 作者: 中止 時間: 2025-3-22 16:03 作者: CANT 時間: 2025-3-22 20:35 作者: 微塵 時間: 2025-3-22 22:55
A Systematic Literature Review on Face Morphing Attack Detection (MAD),elded 2089 papers. Based on the study topic, 33 primary studies were eventually considered. A novel taxonomy of the strategies utilized in MAD for feature extraction is one of the research‘s contributions. The study also discovered that (1) single and differential image-based approaches are the comm作者: 綁架 時間: 2025-3-23 04:19 作者: 密碼 時間: 2025-3-23 07:42
A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain,servation, and analysis of digital evidence. Artificial Intelligence is predominant in many areas and momentum is gaining to utilize it in the field of forensics. This chapter reviews the application of forensics using Artificial Intelligence in the field of Cloud computing, IoT, and Blockchain Tech作者: Hemoptysis 時間: 2025-3-23 12:21 作者: 連系 時間: 2025-3-23 17:32
An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method,odel outperforms them in terms of accuracy, sensitivity, detection rate (DR) false alarm, and specificity. IDS may be used to secure wireless payment systems. It is possible to establish secure integrated network management that is error-free, therefore boosting performance.作者: 白楊 時間: 2025-3-23 18:55
A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection DFurthermore, most of the proposed machine learning intrusion detection system suffered from low detection accuracy and high false positive rate when the models are experimented on high dimensional dataset. The aim of this paper is to propose a binary firefly algorithm (BFFA) based feature selection 作者: 收藏品 時間: 2025-3-23 23:34
Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment Systure was found as an important task for text matching, image processing, and retrieval of images from the database. To achieve optimal performance of the system and make it robust, an experiment was conducted during the login session using the city block distance and other different distance measures作者: Intervention 時間: 2025-3-24 04:12 作者: 劇本 時間: 2025-3-24 07:19
Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges,in the implementation of detection models. . Many detection models that are developed with high accuracy have been discussed. Out of them, most of the models employ Machine Learning techniques for detection of ransomware as it facilitates automated detection. The proportion of the count (37.5%) of M作者: 令人作嘔 時間: 2025-3-24 14:27 作者: seruting 時間: 2025-3-24 17:04
the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: 追逐 時間: 2025-3-24 19:19 作者: 中止 時間: 2025-3-25 00:38 作者: 積云 時間: 2025-3-25 06:54
Chika Yinka-Banjo,Pwamoreno Alli,Sanjay Misra,Jonathan Oluranti,Ravin Ahuja the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: Sputum 時間: 2025-3-25 08:15
Kousik Barik,A. Abirami,Karabi Konar,Saptarshi Das the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: 遺傳學(xué) 時間: 2025-3-25 13:53 作者: 事先無準(zhǔn)備 時間: 2025-3-25 18:05 作者: declamation 時間: 2025-3-25 22:47
Mary Ogbuka Kenneth,Bashir Adebayo Sulaimon,Shafii Muhammad Abdulhamid,Laud Charles Ochei the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: 急急忙忙 時間: 2025-3-26 01:18 作者: 難理解 時間: 2025-3-26 04:26
N. S. Gowri Ganesh,N. G. Mukunth Venkatesh,D. Venkata Vara Prasad the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: agonist 時間: 2025-3-26 09:38
Mathew Emeka Nwanga,Kennedy Chinedu Okafor,Ifeyinwa Eucharia Achumba,Gloria A. Chukwudebe the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: 稀釋前 時間: 2025-3-26 13:52
Roseline Oluwaseun Ogundokun,Sanjay Misra,Amos O. Bajeh,Ufuoma Odomero Okoro,Ravin Ahuja the nuclei 19F and 15N, subvolume III/35C contains the nucleus 1H, subvolume III/35D contains the nucleus 13C, subvolume III/35E contains the nucleus 17O, and subvolume III/35G contains the nucleus 77Se. More nuclei will be presented later..978-3-540-40892-5Series ISSN 1615-1844 Series E-ISSN 1616-9522 作者: Gesture 時間: 2025-3-26 18:59 作者: jumble 時間: 2025-3-26 23:00 作者: Buttress 時間: 2025-3-27 03:04 作者: 溺愛 時間: 2025-3-27 07:50 作者: 致詞 時間: 2025-3-27 12:48
2367-4512 image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researc978-3-030-93452-1978-3-030-93453-8Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: Criteria 時間: 2025-3-27 17:34
Book 2022oMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face mo作者: Patrimony 時間: 2025-3-27 17:58 作者: 有說服力 時間: 2025-3-28 01:28
tional scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 變形 時間: 2025-3-28 05:25
Julián Gómez,Miguel á Olivero,J. A. García-García,María J. Escalonational scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 金哥占卜者 時間: 2025-3-28 08:30
Joseph Bamidele Awotunde,Sanjay Misrational scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 頌揚本人 時間: 2025-3-28 14:15
Chika Yinka-Banjo,Pwamoreno Alli,Sanjay Misra,Jonathan Oluranti,Ravin Ahujational scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: Outmoded 時間: 2025-3-28 15:52
Kousik Barik,A. Abirami,Karabi Konar,Saptarshi Dastional scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 神化怪物 時間: 2025-3-28 20:27
Timibloudi Stephen Enamamutional scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 易于交談 時間: 2025-3-29 01:25 作者: MANIA 時間: 2025-3-29 07:09
Mary Ogbuka Kenneth,Bashir Adebayo Sulaimon,Shafii Muhammad Abdulhamid,Laud Charles Ocheitional scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: growth-factor 時間: 2025-3-29 09:32
Mary Ogbuka Kenneth,Bashir Adebayo Sulaimontional scientists.Also available online in www.springerlink..Nuclear Magnetic Resonance (NMR) is based on the fact that certain nuclei exhibit a magnetic moment, orient by a magnetic field, and absorb characteristic frequencies in the radiofrequency part of the spectrum. The spectral lines of the nu作者: 薄荷醇 時間: 2025-3-29 13:01 作者: LEERY 時間: 2025-3-29 17:51 作者: Malfunction 時間: 2025-3-29 23:20 作者: 紀(jì)念 時間: 2025-3-30 01:26 作者: Carbon-Monoxide 時間: 2025-3-30 04:49 作者: 混沌 時間: 2025-3-30 11:59 作者: 吃掉 時間: 2025-3-30 14:23 作者: 黃瓜 時間: 2025-3-30 16:57 作者: 使熄滅 時間: 2025-3-30 21:45
Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Interneportance. Our lives have significantly transformed positively with the emergence of cutting-edge technologies like big data, edge and cloud computing, artificial intelligence (AI) with the help of the Internet, coupled with the generations of symmetric and asymmetric data distribution using highly v