Personensuche
X
?
Advances in Intelligent Systems and Computing; ITNG 2024: 21st International Conference on Information Technology-New Generations ,
1
Analysis of IoT Vulnerabilities and Proposed Solution Appro..:
, In:
?
Advances in Intelligent Systems and Computing; ITNG 2024: 21st International Conference on Information Technology-New Generations ,
2
Security Analysis of Drone Communication Methods:
, In:
?
2023 14th International Conference on Information and Communication Technology Convergence (ICTC) ,
3
Cybersecurity and Electoral Processes. An Analysis of Block..:
, In:
?
Proceedings of the 2023 8th International Conference on Intelligent Information Technology ,
4
Artificial Intelligence Techniques for SQL Injection Attack..:
, In:
?
2023 International Conference on Electrical, Computer and Energy Technologies (ICECET) ,
5
Analysis of Baseline Security Standards and Predictive Anal..:
, In:
?
Lecture Notes in Networks and Systems; Intelligent Systems and Applications ,
6
Analysis on the Importance of Securing Data to Prevent Poli..:
, In:
?
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) ,
8
An Evaluation Framework for Machine Learning Methods in Det..:
, In:
?
Lecture Notes in Networks and Systems; Intelligent Systems and Applications ,
9
Mitigating IoT Enterprise Vulnerabilities Using Radio Frequ..:
, In:
?
Lecture Notes in Computer Science; HCI International 2022 – Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence ,
10
Ransomware Attack Detection on the Internet of Things Using..:
, In:
?
HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science ,
11
Securing Software Defining Network from Emerging DDoS Attac:
, In:
?
2022 International Conference on Engineering and Emerging Technologies (ICEET) ,
12
Blockchain-based Approach to thwart Replay Attacks targetin..:
, In:
?
Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2; Lecture Notes in Networks and Systems ,
13
Identifying Shared Security Vulnerabilities and Mitigation ..:
, In:
?
Advances in Intelligent Systems and Computing; Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3 ,
15