Search Results - "Computer and Cyber Security"

Refine Results
  1. Cloud-native AI Pipelines for Continuous Infrastructure Optimization and Anomaly Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Three-dimensional Decision Task Offloading Model in Mobile Edge Computing

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Interference-aware Deep Quantum Neural Network for NOMA Channel Estimation via Adaptive Energy Valley Optimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Advances in Malware Detection using Machine Learning and Deep Learning: A Comprehensive Comparative Analysis

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Securing Fog-assisted IoT: An Adaptable and Efficient Threat Identification Approach

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Assessment of Social Capital from Mobile Сommunication Data: A Cascade Model Based on Random Forest and Logistic Regression

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Reinforcement Learning-Based Self-Healing Routing in Fault-prone Wireless Sensor Networks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Adaptive Tangent Homomorphic Encryption with Equivariant Quantum Neural Networks for Secure Data Transmission Routing in MANET

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. An Innovative Method for Detecting Fake News Distribution Sources based on Machine Learning Technology and Graph Theory

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. A Lightweight Framework Using Signcryption Based Key Agreement Scheme with Location Privacy for D2D Communications in 5G VANETs

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Addressing Data Privacy Concerns in IoT Architecture with Federated Learning and TinyML

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Blockchain-enhanced Detection of Malicious Nodes in WSNs Using Parallel Triple Graph Attention-based Convolution Network

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. First Fully Pipelined High Throughput FPGA Implementation and GPU Optimization of Wider Variant of AES

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. Advancing training stability in unsupervised SEM image segmentation for IC layout extraction

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Implementations of FAST and AEZ on field programmable gate arrays for low level encryption of disks with 4096-byte sectors

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Netlist whisperer: extensive analysis of circuit leakage using LLMs

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Cover chirp jamming: hybrid jamming–deception attack on FMCW radar and its countermeasure

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. New lattice-based partial key exposure attacks on common prime RSA

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Single engine architecture for hardware root of trust

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article