392 results on '"Ghorbani, Ali"'
Search Results
2. Area in circle: A novel evaluation metric for object detection
3. Review of: "Supervisory Relationships, Constructing Academic Identity, and Transition to the Researcher: An Interpretative Single-Case Study"
4. CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus
5. Anti-N-Methyl-D-Aspartate Receptor Encephalopathy in a Young Female
6. Clinical and functional outcomes of 405 Achilles tendon ruptures after a minimum follow-up of 1 year
7. An analysis of deep steganography and steganalysis
8. Enhancing Zn-bearing gossans from GeoEye-1 and Landsat 8 OLI data for non-sulphide Zn deposit exploration
9. CICIoMT2024: Attack Vectors in Healthcare devices-A Multi-Protocol Dataset for Assessing IoMT Device Security
10. Securing Financial Sector Applications in the Quantum Era: A Comprehensive Evaluation of Nist's Recommended Algorithms Through Use-Case Analysis
11. A Study of Ev-Evse Ecosystem Integrity: Machine Learning Based Security Monitoring of Charging Sessions
12. Ciciov2024:Advancing Realistic Ids Approaches Against Dos and Spoofing Attack in Iov Can Bus
13. Dns User Profiling and Risk Assessment: A Learning Approach
14. A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
15. Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration
16. CiCIoMT2024: Attack Vectors in Healthcare Devices-A Multi-Protocol Dataset for Assessing IoMT Device Security
17. Human Factors in Cybersecurity
18. Dental Infection Causing Methicillin-Resistant Staphylococcus aureus Bacteremia and Spinal Infection: A Case Report
19. Emerging cancer in individuals with cardiovascular disease: Exploring the intersection of reverse cardio-oncology and nephropharmacology
20. A survey on run-time packers and mitigation techniques
21. Takotsubo Cardiomyopathy Induced by Stress From Amyotrophic Lateral Sclerosis and a Mechanical Fall
22. Enhancing residents’ neonatal resuscitation competency through team-based simulation training: an intervention educational study
23. Cyber Criminal Profiling
24. Human Factors in Cybersecurity
25. Threat Hunting in Windows Using Big Security Log Data
26. Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach
27. DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure
28. UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor
29. Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment
30. Parent process termination: an adversarial technique for persistent malware
31. Internet of Things (IoT) security dataset evolution: Challenges and future directions
32. A Detailed Analysis of the CICIDS2017 Data Set
33. Generating Phishing Emails Using Graph Database
34. CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment
35. TruthSeeker: The Largest Social Media Ground-Truth Dataset for Real/Fake Content
36. TruthSeeker: The Largest Social Media Ground-Truth Dataset for Real/Fake Content
37. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment
38. Mechanical characterization of marl soil treated by cement and lignosulfonate under freeze–thaw cycles: experimental studies and machine-learning modeling
39. IoT Zigbee device security: A comprehensive review
40. ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol
41. Security issues in Internet of Vehicles (IoV): A comprehensive survey
42. Liquefaction Potential of Saturated Sand Reinforced by Cement-Grouted Micropiles: An Evolutionary Approach Based on Shaking Table Tests
43. A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems
44. Nonlinear vibration of electro-rheological sandwich plates, coupled to quiescent fluid
45. CapsRule: Explainable Deep Learning for Classifying Network Attacks
46. Data Breach: Analysis, Countermeasures, and Challenges
47. Multimodal Fake News Analysis Based on Image–Text Similarity
48. The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker
49. A Comprehensive SMS-Based Intrusion Detection Framework
50. Ensemble-based Intrusion Detection for Internet of Things Devices
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.