Search

Your search keyword '"Naima Kaabouch"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Naima Kaabouch" Remove constraint Author: "Naima Kaabouch" Topic computer Remove constraint Topic: computer
33 results on '"Naima Kaabouch"'

Search Results

1. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions

2. Breast Cancer: Classification of Tumors Using Machine Learning Algorithms

3. Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid

4. A Stacking-based Ensemble Learning Model with Genetic Algorithm For detecting Early Stages of Alzheimer’s Disease

5. Social Engineering Attacks A Reconnaissance Synthesis Analysis

6. Visualizing and Predicting Culex Tarsalis Trapcounts for West Nile Virus (WNV) Disease Incidence using Machine Learning Models

7. Security threats and countermeasures of MAC layer in cognitive radio networks

8. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system

9. Real-time spectrum occupancy monitoring using a probabilistic model

10. A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication

11. On Spectrum Sensing, a Machine Learning Method for Cognitive Radio Systems

12. Performance Comparison of Machine Learning Algorithms in Detecting Jamming Attacks on ADS-B Devices

13. RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks

14. A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

15. A Cooperative Spectrum Sensing Scheme Based on Compressive Sensing for Cognitive Radio Networks

16. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

17. A preliminary effort toward investigating the impacts of ADS-B message injection attack

18. Cyber-Security in Smart Grid: Survey and Challenges

19. Social Engineering Attacks: A Survey

20. Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation

21. Outage probability estimation technique based on a Bayesian model for cognitive radio networks

22. Predicting West Nile Virus (WNV) occurrences in North Dakota using data mining techniques

23. A Bayesian inference method for estimating the channel occupancy

24. An Empirical Study of NoSQL Databases for Big Data

26. Privacy-Preserving Spatial Trajectory Prediction

27. Fuzzy Logic Method for Link Loss Detection during Unmanned Aerial Vehicle Flights

28. Essential Technologies for Location-Aware Mobile, Online Map Prefetching, and Caching

29. Incremental location searching for route anomaly detection

30. FPGA-based combined PWM-PFM technique to control DC-DC converters

31. An optimization neural network for smartphone data protection

32. Mobile Data Protection Using Handheld Usage Context Matching

33. Automatic techniques for gridding CDNA microarray images

Catalog

Books, media, physical & digital resources