Search

Your search keyword '"Cybersecurity applications"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "Cybersecurity applications" Remove constraint Descriptor: "Cybersecurity applications"
9 results on '"Cybersecurity applications"'

Search Results

2. A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models.

3. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

4. Probing for Psycho-Physiological Correlates of Cognitive Interaction with Cybersecurity Events

5. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

6. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning

7. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning

8. A Semantic Framework for the Design of Distributed Reactive Real-Time Languages and Applications

9. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets.

Catalog

Books, media, physical & digital resources