From post

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.

, , , , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8112-8121 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device., , , и . CoRR, (2019)The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud., , и . CoRR, (2022)Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform., , , , , , , и . Entropy, 24 (10): 1379 (2022)PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform., , , и . Softw. Impacts, (2021)SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data., , , , , , и . CoRR, (2023)PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching., , , , и . SIN, стр. 1-8. IEEE, (2021)Microtargeting or Microphishing? Phishing Unveiled., , , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 89-105. Springer, (2020)A Practical Steganographic Approach for Matroska Based High Quality Video Files., , , и . AINA Workshops, стр. 684-688. IEEE Computer Society, (2013)PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms., , , , , и . CAMAD, стр. 188-193. IEEE, (2023)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , и . CoRR, (2019)