Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Visual Analysis of Time-Series Similarities for Anomaly Detection in Sensor NetworksSteiger, Martin ; Bernard, Jürgen ; Mittelstädt, Sebastian ; Lücke-Tieke, Hendrik ; Keim, Daniel ; May, Thorsten ; Kohlhammer, JörnComputer graphics forum, 2014-06, Vol.33 (3), p.401-410 [Periódico revisado por pares]Oxford: Blackwell Publishing LtdTexto completo disponível |
|
2 |
Material Type: Artigo
|
Platform Architecture and Quality Trade-offs of Multihoming ComplementsCennamo, Carmelo ; Ozalp, Hakan ; Kretschmer, TobiasInformation systems research, 2018-06, Vol.29 (2), p.461-478 [Periódico revisado por pares]Linthicum: INFORMSTexto completo disponível |
|
3 |
Material Type: Artigo
|
Vehicular Networks: A New Challenge for Content-Delivery-Based ApplicationsSilva, Fabrício ; Boukerche, Azzedine ; Silva, Thais ; Ruiz, Linnyer ; Cerqueira, Eduardo ; Loureiro, AntonioACM computing surveys, 2016-07, Vol.49 (1), p.1-29 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
|
4 |
Material Type: Artigo
|
TermID: a distributed swarm intelligence-based approach for wireless intrusion detectionKolias, Constantinos ; Kolias, Vasilis ; Kambourakis, GeorgiosInternational journal of information security, 2017-08, Vol.16 (4), p.401-416 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
5 |
Material Type: Artigo
|
Computer network security evaluation model based on neural networkLi, Xinwei ; Chen, Hui ; Ariann, Bryan Yuan, Xiaohui ; Elhoseny, MohamedJournal of intelligent & fuzzy systems, 2019-01, Vol.37 (1), p.71-78 [Periódico revisado por pares]Amsterdam: IOS Press BVTexto completo disponível |
|
6 |
Material Type: Artigo
|
A novel MADM technique based on projection methods under q-rung orthopair fuzzy setting and its application to computer network security evaluationQiao, WenbaoJournal of intelligent & fuzzy systems, 2023-01, Vol.45 (1), p.1029-1038 [Periódico revisado por pares]Amsterdam: IOS Press BVTexto completo disponível |
|
7 |
Material Type: Artigo
|
Detecting weak dependence in computer network traffic patterns by using higher criticismPrice-Williams, Matthew ; Heard, Nick ; Rubin-Delanchy, PatrickJournal of the Royal Statistical Society Series C: Applied Statistics, 2019-04, Vol.68 (3), p.641-655 [Periódico revisado por pares]Oxford: WileyTexto completo disponível |
|
8 |
Material Type: Artigo
|
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendationsYaacoub, Jean-Paul A. ; Noura, Hassan N. ; Salman, Ola ; Chehab, AliInternational journal of information security, 2022-02, Vol.21 (1), p.115-158 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
9 |
Material Type: Artigo
|
Computer network security technology based on artificial intelligenceHua, Tao ; Li, Laixiang Rocha, Álvaro ; Guarda, Teresa ; Lopes, IsabelJournal of intelligent & fuzzy systems, 2019-01, Vol.37 (5), p.6021-6028 [Periódico revisado por pares]Amsterdam: IOS Press BVTexto completo disponível |
|
10 |
Material Type: Artigo
|
MyoV: a deep learning-based tool for the automated quantification of muscle fibersGu, Shuang ; Wen, Chaoliang ; Xiao, Zhen ; Huang, Qiang ; Jiang, Zheyi ; Liu, Honghong ; Gao, Jia ; Li, Junying ; Sun, Congjiao ; Yang, NingBriefings in bioinformatics, 2024-01, Vol.25 (2) [Periódico revisado por pares]England: Oxford University PressTexto completo disponível |