Search

Your search keyword '"C.2.0"' showing total 735 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
735 results on '"C.2.0"'

Search Results

1. Improved subsample-and-aggregate via the private modified winsorized mean

2. A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

3. Blockchain-Driven Research in Personality-Based Distributed Pair Programming

4. Recovering WPA-3 Network Password by Bypassing the Simultaneous Authentication of Equals Handshake using Social Engineering Captive Portal

5. Toward an Insider Threat Education Platform: A Theoretical Literature Review

6. Red Pill and Blue Pill: Controllable Website Fingerprinting Defense via Dynamic Backdoor Learning

7. How to design a Public Key Infrastructure for a Central Bank Digital Currency

8. Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications

9. Lagrangian neural networks for nonholonomic mechanics

10. A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals

11. Enabling Practical and Privacy-Preserving Image Processing

12. Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection

13. Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets

14. Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis

15. Are We Up to the Challenge? An analysis of the FCC Broadband Data Collection Fixed Internet Availability Challenges

16. Learning on JPEG-LDPC Compressed Images: Classifying with Syndromes

17. Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks

18. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design

19. STAC: Leveraging Spatio-Temporal Data Associations For Efficient Cross-Camera Streaming and Analytics

20. Graded modal logic and counting message passing automata

21. On the Burstiness of Distributed Machine Learning Traffic

22. Zero-Touch Networks: Towards Next-Generation Network Automation

23. CO-ASnet :A Smart Contract Architecture Design based on Blockchain Technology with Active Sensor Networks

24. OFDM-RSMA: Robust Transmission under Inter-Carrier Interference

25. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

26. Forensic Data Analytics for Anomaly Detection in Evolving Networks

27. Descriptive complexity for neural networks via Boolean networks

28. A Blockchain-based Electronic Voting System: EtherVote

29. Information Leakage from Optical Emanations

30. Exploring Fully Offloaded GPU Stream-Aware Message Passing

31. Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

32. The Effect of Length on Key Fingerprint Verification Security and Usability

33. Application of genetic algorithm to load balancing in networks with a homogeneous traffic flow

34. Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA

35. Descriptive complexity for distributed computing with circuits

36. ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

37. Hawkeye: Hectometer-range Subcentimeter Localization for Large-scale mmWave Backscatter

38. Techno-Economic Assessment in Communications: New Challenges

39. Blockchain Technology to Secure Bluetooth

40. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

41. IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective

42. Four Algorithms on the Swapped Dragonfly

43. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

44. F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications

45. Exploring GPU Stream-Aware Message Passing using Triggered Operations

46. LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

47. Anomaly Detection in Intra-Vehicle Networks

48. An Energy Aware Clustering Scheme for 5G-enabled Edge Computing based IoMT Framework

49. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

50. Prepare your video for streaming with Segue

Catalog

Books, media, physical & digital resources