Search

Your search keyword '"C.2.0"' showing total 727 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
727 results on '"C.2.0"'

Search Results

1. Lagrangian neural networks for nonholonomic mechanics

2. A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals

3. Enabling Practical and Privacy-Preserving Image Processing

4. Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection

5. Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets

6. Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis

7. Are We Up to the Challenge? An analysis of the FCC Broadband Data Collection Fixed Internet Availability Challenges

8. Learning on JPEG-LDPC Compressed Images: Classifying with Syndromes

9. Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks

10. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design

11. STAC: Leveraging Spatio-Temporal Data Associations For Efficient Cross-Camera Streaming and Analytics

12. Graded modal logic and counting message passing automata

13. On the Burstiness of Distributed Machine Learning Traffic

14. Zero-Touch Networks: Towards Next-Generation Network Automation

15. CO-ASnet :A Smart Contract Architecture Design based on Blockchain Technology with Active Sensor Networks

16. OFDM-RSMA: Robust Transmission under Inter-Carrier Interference

17. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

18. Forensic Data Analytics for Anomaly Detection in Evolving Networks

19. Descriptive complexity for neural networks via Boolean networks

20. A Blockchain-based Electronic Voting System: EtherVote

21. Information Leakage from Optical Emanations

22. Exploring Fully Offloaded GPU Stream-Aware Message Passing

23. Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

24. The Effect of Length on Key Fingerprint Verification Security and Usability

25. Application of genetic algorithm to load balancing in networks with a homogeneous traffic flow

26. Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA

27. Descriptive complexity for distributed computing with circuits

28. ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

29. Hawkeye: Hectometer-range Subcentimeter Localization for Large-scale mmWave Backscatter

30. Techno-Economic Assessment in Communications: New Challenges

31. Blockchain Technology to Secure Bluetooth

32. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

33. IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective

34. Four Algorithms on the Swapped Dragonfly

35. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

36. F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications

37. Exploring GPU Stream-Aware Message Passing using Triggered Operations

38. LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

39. Anomaly Detection in Intra-Vehicle Networks

40. An Energy Aware Clustering Scheme for 5G-enabled Edge Computing based IoMT Framework

41. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

42. Prepare your video for streaming with Segue

43. Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

44. The Swapped Dragonfly

45. Six Questions about 6G

46. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

47. Attention-Based Model and Deep Reinforcement Learning for Distribution of Event Processing Tasks

48. A User Centric Blockage Model for Wireless Networks

49. Centralization is about Control, not Protocols (Position Paper)

50. NSF Broadband Research 2020 Report

Catalog

Books, media, physical & digital resources