Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
Evaluating the Security Posture of 5G Networks by Combining..:
, In:
?
Security Standardisation Research; Lecture Notes in Computer Science ,
2
On Reducing Underutilization of Security Standards by Deriv..:
, In:
?
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
3
Feature Reduction through Data Preprocessing for Intrusion ..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Quality, Reliability, Security and Robustness in Heterogeneous Systems ,
4
Towards an Attention-Based Accurate Intrusion Detection App..:
, In:
?
Proceedings of International Joint Conference on Computational Intelligence; Algorithms for Intelligent Systems ,
6
A Comparative Overview of Classification Algorithm for Bang..:
, In:
?
2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON) ,
7
Application of Transfer Learning to Detect Potato Disease f..:
, In:
?
2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT) ,
8
Bangla Handwritten Character Recognition: an overview of th..:
, In:
?
2016 19th International Conference on Computer and Information Technology (ICCIT) ,
9
Evaluation of LPC trajectory for Vowel-Consoant-Vowel seque..:
, In:
?
2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT) ,
10
Prediction of Potato Disease from Leaves using Deep Convolu..:
, In:
?
17th International Conference on Developments in Power System Protection (DPSP 2024) ,
14
Impact on breaker failure protection by using non-conventio..:
, In:
?
17th International Conference on Developments in Power System Protection (DPSP 2024) ,
15