咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 信息与通信工程
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 2 篇 machine learning
  • 1 篇 cyber security
  • 1 篇 intrusion detect...
  • 1 篇 evolution
  • 1 篇 intrusion preven...
  • 1 篇 cipher text
  • 1 篇 botnet
  • 1 篇 cancer
  • 1 篇 symmetric algori...
  • 1 篇 genetic mutation...
  • 1 篇 text classificat...
  • 1 篇 songs reviews:se...
  • 1 篇 topic modeling
  • 1 篇 natural language...
  • 1 篇 aspect level sen...
  • 1 篇 smart manufactur...
  • 1 篇 therapy
  • 1 篇 self-symmetry
  • 1 篇 fused machine le...
  • 1 篇 automated file l...

机构

  • 3 篇 institute of inf...
  • 3 篇 faculty of civil...
  • 3 篇 department of co...
  • 3 篇 john von neumann...
  • 2 篇 future technolog...
  • 2 篇 institute of inf...
  • 2 篇 john von neumann...
  • 2 篇 department of so...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 1 篇 the department o...
  • 1 篇 department of co...
  • 1 篇 institute of inf...
  • 1 篇 school of comput...
  • 1 篇 the state key la...
  • 1 篇 school of comput...
  • 1 篇 john von neumann...
  • 1 篇 ieee
  • 1 篇 the institute of...
  • 1 篇 lahore institute...

作者

  • 5 篇 amir mosavi
  • 3 篇 muhammad adnan k...
  • 3 篇 atta-ur-rahman
  • 2 篇 saman riaz
  • 2 篇 sagheer abbas
  • 2 篇 muhammad nadeem
  • 2 篇 kiran sultan
  • 2 篇 ali arshad
  • 1 篇 syedawajiha zahr...
  • 1 篇 nan zheng
  • 1 篇 levente kovács
  • 1 篇 shahab s.band
  • 1 篇 syed ali raza
  • 1 篇 qinghua ni
  • 1 篇 jing yang
  • 1 篇 juanjuan li
  • 1 篇 muhammad rashid
  • 1 篇 makhan
  • 1 篇 qing-long han
  • 1 篇 radu prodan

语言

  • 7 篇 英文
检索条件"机构=John von Neumann Faculty of Informatics"
7 条 记 录,以下是1-10 订阅
排序:
Securing the Future after Pager Bombs:Lifecycle Protection of Smart Devices via Blockchain Intelligence
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2355-2358页
作者: Fei Lin Qinghua Ni Jing Yang Juanjuan Li Nan Zheng Levente Kovács Radu Prodan Mariagrazia Dotoli Qing-Long Han Fei-Yue Wang the Department of Engineering Science Faculty of Innovation Engineering Macau University of Science and Technology the State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences the School of Artificial Intelligence University of Chinese Academy of Sciences IEEE Obuda University John von Neumann Faculty of Informatics the Institute of Information Technology University of Klagenfurt the Department of Electrical and Information Engineering Polytechnic of Bari the School of Science Computing and Engineering Technologies Swinburne University of Technology the State Key Laboratory for Management and Control of Complex Systems Chinese Academy of Sciences
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary john von neumann faculty of informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2641-2659页
作者: Muhammad Nadeem Ali Arshad Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary john von neumann faculty of informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaSlovakia
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Exploring Biocomplexity in Cancer: A Comprehensive Review
收藏 引用
Open Journal of Biophysics 2024年 第2期14卷 154-238页
作者: Andras Szasz Gyula Peter Szigeti Department of Biotechnics Hungarian University of Agriculture and Life Sciences G&#246d&#246ll&#337 Hungary john von neumann faculty of informatics O&#769buda University Budapest Hungary
Living objects have complex internal and external interactions. The complexity is regulated and controlled by homeostasis, which is the balance of multiple opposing influences. The environmental effects finally guide ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Fused Machine Learning Approach for Intrusion Detection System
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2607-2623页
作者: Muhammad Sajid Farooq Sagheer Abbas Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam 31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea john von neumann faculty of informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia faculty of Civil Engineering TU-DresdenDresden01062Germany
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Aspect Level Songs Rating Based Upon Reviews in English
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2589-2605页
作者: Muhammad Aasim Qureshi Muhammad Asif Saira Anwar Umar Shaukat Atta-ur-Rahman Muhammad Adnan Khan Amir Mosavi Department of Computer Science Bahria University Lahore54000Pakistan Lahore Institute of Science and Technology Lahore 54792Pakistan Department of Multidisciplinary Engineering Texas A&M UniversityCollege Station77843USA Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam 31441Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea john von neumann faculty of informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia faculty of Civil Engineering TU-DresdenDresden01062Germany
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3263-3278页
作者: Sagheer Abbas Syed Ali Raza MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science GC University LahorePakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnam13120Korea Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah31261Saudi Arabia john von neumann faculty of informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia faculty of Civil Engineering TU-DresdenDresden01062Germany
File labeling techniques have a long history in analyzing the anthological trends in computational *** situation becomes worse in the case of files downloaded into systems from the ***,most users either have to change... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论