Search Result "intrusion protection"


Intrusion Detection in IoT Based Health Monitoring Systems

Ebook: Mobile Computing Solutions for Healthcare Systems
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815050592123010007

Letter Article

Network Intrusion Detection Methods Based on Deep Learning

Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 11-19
Author(s): Xiangwen Li,Shuang Zhang

Intrusion Detection System for the Internet of Medical Things (IoMT)

Ebook: Emerging Technologies for Digital Infrastructure Development
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815080957123010010

Machine Learning-based Intrusion Detection for Position Falsification Attack in the Internet of Vehicles

Ebook: Intelligent Systems for IoE Based Smart Cities
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815124965123010009

Research Article

Optical Interferometric Corrosion Protection Evaluation of a Coated Copper in Sulphate/Chloride Solution

Journal: Innovations in Corrosion and Materials Science (Discontinued)
Volume: 7 Issue: 1 Year: 2017 Page: 46-51
Author(s): Darwin Mayorga,Diego Uribe,Rene Guardian,Carmina Menchaca-Campos,Jorge Uruchurtu

Environmental Risk and Protective Factors and Their Influence on the Emergence of Psychosis

Journal: Adolescent Psychiatry
Volume: 2 Issue: 2 Year: 2012 Page: 163-171
Author(s): Danielle A. Schlosser,Rahel Pearson,Veronica B. Perez,Rachel L. Loewy

Anti-Infective Protective Properties of S100 Calgranulins

Journal: Anti-Inflammatory & Anti-Allergy Agents in Medicinal Chemistry
Volume: 8 Issue: 4 Year: 2009 Page: 290-305
Author(s): Kenneth Hsu, Chantrakorn Champaiboon, Brian D. Guenther, Brent S. Sorenson, Ali Khammanivong, Karen F. Ross, Carolyn L. Geczy, Mark C. Herzberg

Evaluation of Financial Losses Suffered by Enterprises due to Information System Accidents

Ebook: Firms` Strategic Decisions: Theoretical and Empirical Findings
Volume: 2 Year: 2016
Author(s): Sergii Kavun,Vyacheslav V. Kalashnikov,Nataliya Kalashnykova,Olexandr Cherevko
Doi: 10.2174/9781681082530116020012

Review of Solutions for Securing End-User Data Over Cloud Applications

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010008

Previous   Next

Go To   Results 1 - 1 of 353

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy