369 results on '"Kadobayashi, Youki"'
Search Results
2. Securing Smart Vehicles Through Federated Learning
3. Securing Smart Vehicles Through Federated Learning
4. Smart home cybersecurity awareness and behavioral incentives
5. Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network
6. DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations
7. Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
8. Attributes affecting user decision to adopt a Virtual Private Network (VPN) app
9. Autonomous Driving Model Defense Study on Hijacking Adversarial Attack
10. Research and Innovation Aspects
11. Industry and Standardization Aspects
12. Legal and Policy Aspects
13. A survey on blockchain, SDN and NFV for the smart-home security
14. Summary
15. A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications
16. SDN-Enabled IoT Anomaly Detection Using Ensemble Learning
17. CDMC’19—The 10th International Cybersecurity Data Mining Competition
18. DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
19. Introduction
20. Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
21. Interdependency Attack-aware Secure and Performant Virtual Machine Allocation Policies with Low Attack Efficiency and Coverage
22. Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity
23. Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation
24. Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning with Real and Synthetic Attacks
25. Ontological Approach toward Cybersecurity in Cloud Computing
26. Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency
27. A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications
28. Cybersecurity Research Analysis Report for Europe and Japan
29. A normative decision-making model for cyber security
30. A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning
31. Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis
32. Introduction
33. Research and Innovation Aspects
34. Summary
35. Industry and Standardization Aspects
36. Legal and Policy Aspects
37. Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App
38. CDMC’19—The 10th International Cybersecurity Data Mining Competition
39. Benchmarking DNS64 implementations: Theory and practice
40. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64
41. Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System
42. Benchmarking methodology for DNS64 servers
43. Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
44. Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification
45. HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
46. Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data
47. Attacker Localization with Machine Learning in RS-485 Industrial Control Networks
48. An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks
49. Multi-path transmission algorithm for end-to-end seamless handover across heterogeneous wireless access networks
50. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.