Search

Your search keyword '"Jenkins, Paul"' showing total 114 results

Search Constraints

Start Over You searched for: Author "Jenkins, Paul" Remove constraint Author: "Jenkins, Paul" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
114 results on '"Jenkins, Paul"'

Search Results

1. Understanding the Defence of Operational Technology (OT) Systems: A Comparison of Lockheed Martin’s Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model

2. AI Financial Adviser Performance and Monitoring of AI Derived Stocks

3. A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN

4. An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges

5. Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service (DDoS) Attacks

6. Challenges in Implementing Artificial Intelligence on the Raspberry Pi 4, 5 and 5 with AI HAT

7. Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

8. Analysing Cyberattacks Using Attack Tree and Fuzzy Rules

9. Privacy and Security Landscape of Metaverse

10. Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack

12. Learning Agile Scrum Methodology Using the Groupware Tool Trello Through Collaborative Working

23. How Many Transcripts Does It Take to Reconstruct the Splice Graph?

27. Link Prediction in Stochastic Online Social Network Using Machine Learning Algorithm

28. Comparative Analysis of Community Detection Methods for Online Learning Environments

29. Explainability and Transparency in Designing Responsible AI Applications in the Enterprise

30. Feature Extraction Methods in Alzheimer’s Disease: A Comparative Assessment

31. Higher Education Students Performance and Feature Analysis Using Classification Models Based on Blended Learning Data

32. Exploring U-Net, FCN, SegNet, PSPNet, Mask R-CNN and Using DeepLabV3+ for Multiclass Semantic Segmentation on Satellite Images of Western Ghats

33. Experimental Demonstration for Learning Analytics and Data Mining on e-assessment

34. A Decision Tree Approach for Identifying Indian Penal Code Sections Across Different Crime Aspects

35. Applications of AI Chatbots Based on Generative AI, Large Language Models and Large Multimodal Models

36. Rise of Federated Learning to Real-World Applications

37. Handling Overfitting and Imbalance Data in Modelling Convolutional Neural Networks for Astronomical Transient Discovery

38. Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection

39. Leveraging the Use of ChatGPT: Exploring Its Real-World Applications Including Their Related Ethical and Regulatory Considerations

40. Threat Modelling in Virtual Assistant Hub Devices

41. DAN: Deep Neural Network-Based Application Mapping for Optimized Network-on-Chip Design

42. Information Communication Technology (ICT) Tools for Online Learning Environments (OLE) Towards Quality Higher Education with NEP-2020

43. Information Security Primitives Automatic Variable Key Approaches and Cryptic Mining

44. Cyber Attacks and Review of Recent Data Breach Incidents Their Trends and Measures

45. Prompt Engineering for Personalized Assessment and Formative Assessment in Technical Education

46. Investigating the Benefits and Barriers of Using AI Chatbots in Education

47. Is ChatGPT Effective or Disruptive in Education?

48. Towards an IoT-Enabled Support System for Water Management Control, with a Focus on Storm, Drainage, and Sewage Systems

49. An Empirical Study on Insider Threats Towards Crime Prevention Through Environmental Design (CPTED) : A Student Case Study

50. Methods to Improve API Performance in PHP Programming Language

Catalog

Books, media, physical & digital resources