找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Yassine Maleh,Youssef Baddi,Imed Romdhani Book 2021 The Edit

[復制鏈接]
樓主: 候選人名單
21#
發(fā)表于 2025-3-25 06:00:25 | 只看該作者
A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technolcious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.
22#
發(fā)表于 2025-3-25 10:27:31 | 只看該作者
A Framework Using Artificial Intelligence for Vision-Based Automated Firearm Detection and Reportinge 3rd person or agency about the incident. It can also manually highlight any object in a frame to keep track of its movement for security purposes. Machine and Deep Learning techniques were used to train models for object detection and facial recognition. The model achieved an accuracy of 97.33% in object detection and 90% in facial recognition.
23#
發(fā)表于 2025-3-25 11:54:22 | 只看該作者
24#
發(fā)表于 2025-3-25 18:49:36 | 只看該作者
2197-6503 uture cybersecurity applications.Proposes new models, practi.This book presents state-of-the-art?research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial?intelligence and blockchain challenges, mode
25#
發(fā)表于 2025-3-25 23:58:38 | 只看該作者
26#
發(fā)表于 2025-3-26 02:51:06 | 只看該作者
27#
發(fā)表于 2025-3-26 07:10:58 | 只看該作者
Towards Sustainable Land Use in Asiak would be in encrypted form to avoid the possibility of data manipulation or access by an unauthentic user. The IDS system is capable to trace attacks of different categories as the random classifier has classified the attacks.
28#
發(fā)表于 2025-3-26 11:50:41 | 只看該作者
29#
發(fā)表于 2025-3-26 15:02:28 | 只看該作者
30#
發(fā)表于 2025-3-26 16:53:49 | 只看該作者
Classification of Cyber Security Threats on Mobile Devices and Applicationsapplications-cyber security threat classifications, which includes most cyber threats classification and principles. The main purpose of our framework is to systematically identify cyber security threats, show their potential impacts, draw the mobile users’ attention to those threats, and enable them to take protective actions as appropriate.
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 03:06
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
岐山县| 开平市| 沁源县| 农安县| 黔东| 鄂伦春自治旗| 新巴尔虎左旗| 天长市| 高陵县| 镇坪县| 增城市| 互助| 历史| 南投市| 来宾市| 清苑县| 迭部县| 交城县| 孝昌县| 鞍山市| 南投县| 静宁县| 新竹县| 崇明县| 太仆寺旗| 芷江| 庆阳市| 余干县| 张家界市| 四川省| 瑞昌市| 伊春市| 长白| 和平县| 平南县| 南康市| 南丹县| 阳曲县| 红桥区| 玛沁县| 泸州市|