Search

Your search keyword '"C.2.0"' showing total 726 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
726 results on '"C.2.0"'

Search Results

1. A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals

2. Enabling Practical and Privacy-Preserving Image Processing

3. Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection

4. Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets

5. Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis

6. Are We Up to the Challenge? An analysis of the FCC Broadband Data Collection Fixed Internet Availability Challenges

7. Learning on JPEG-LDPC Compressed Images: Classifying with Syndromes

8. Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks

9. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design

10. STAC: Leveraging Spatio-Temporal Data Associations For Efficient Cross-Camera Streaming and Analytics

11. Graded modal logic and counting message passing automata

12. On the Burstiness of Distributed Machine Learning Traffic

13. Zero-Touch Networks: Towards Next-Generation Network Automation

14. CO-ASnet :A Smart Contract Architecture Design based on Blockchain Technology with Active Sensor Networks

15. OFDM-RSMA: Robust Transmission under Inter-Carrier Interference

16. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

17. Forensic Data Analytics for Anomaly Detection in Evolving Networks

18. Descriptive complexity for neural networks via Boolean networks

19. A Blockchain-based Electronic Voting System: EtherVote

20. Information Leakage from Optical Emanations

21. Exploring Fully Offloaded GPU Stream-Aware Message Passing

22. Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

23. The Effect of Length on Key Fingerprint Verification Security and Usability

24. Application of genetic algorithm to load balancing in networks with a homogeneous traffic flow

25. Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA

26. Descriptive complexity for distributed computing with circuits

27. ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

28. Hawkeye: Hectometer-range Subcentimeter Localization for Large-scale mmWave Backscatter

29. Techno-Economic Assessment in Communications: New Challenges

30. Blockchain Technology to Secure Bluetooth

31. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

32. IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective

33. Four Algorithms on the Swapped Dragonfly

34. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

35. F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications

36. Exploring GPU Stream-Aware Message Passing using Triggered Operations

37. LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

38. Anomaly Detection in Intra-Vehicle Networks

39. An Energy Aware Clustering Scheme for 5G-enabled Edge Computing based IoMT Framework

40. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

41. Prepare your video for streaming with Segue

42. Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

43. The Swapped Dragonfly

44. Six Questions about 6G

45. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

46. Attention-Based Model and Deep Reinforcement Learning for Distribution of Event Processing Tasks

47. A User Centric Blockage Model for Wireless Networks

48. Centralization is about Control, not Protocols (Position Paper)

49. NSF Broadband Research 2020 Report

50. Scheduling Algorithms for Age of Information Differentiation with Random Arrivals

Catalog

Books, media, physical & digital resources