22 results on '"Al-Shehari, Taher"'
Search Results
2. Comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection
3. Optimized polycystic ovarian disease prognosis and classification using AI based computational approaches on multi-modality data
4. Blockchain with secure data transactions and energy trading model over the internet of electric vehicles
5. Insider threat detection in cyber-physical systems: a systematic literature review
6. DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation
7. S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs
8. Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
9. A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
10. Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm
11. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
12. SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures.
13. Detection and Classification of Temporal Changes for Citrus Canker Growth Rate using Deep Learning
14. Insider Threat Detection Model using Anomaly-Based Isolation Forest Algorithm
15. Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
16. Techniques and countermeasures for preventing insider threats
17. An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
18. A Multi-Tiered Framework for Insider Threat Prevention
19. Empirical Detection Techniques of Insider Threat Incidents
20. Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication.
21. Improving Operating System Fingerprinting using Machine Learning Techniques
22. Wireless video streaming over Data Distribution Service middleware
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.