I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Implementation of Extreme Learning Model for Cyber Security..:
, In:
2023 International Conference on Sustainable Communication Networks and Application (ICSCNA)
,
Parvathi, S.
;
Sushma, T.
;
K, Anusree
... - p. 374-379 , 2023
Link:
https://doi.org/10.1109/ICSCNA58489.2023.10370596
RT T1
2023 International Conference on Sustainable Communication Networks and Application (ICSCNA)
: T1
Implementation of Extreme Learning Model for Cyber Security in IoT Networks
UL https://suche.suub.uni-bremen.de/peid=ieee-10370596&Exemplar=1&LAN=DE A1 Parvathi, S. A1 Sushma, T. A1 K, Anusree A1 Raju Talari, Venkata Syamala A1 Anirudh Dasari, Satya Nageswara A1 Gokula Krishnan, V. YR 2023 K1 Support vector machines K1 Machine learning algorithms K1 Extreme learning machines K1 Heuristic algorithms K1 Refining K1 Intrusion detection K1 Communication channels K1 Extreme Learning Machines K1 Internet of Things K1 network security K1 intrusion detection systems and cybersecurity challenges SP 374 OP 379 LK http://dx.doi.org/https://doi.org/10.1109/ICSCNA58489.2023.10370596 DO https://doi.org/10.1109/ICSCNA58489.2023.10370596 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)