Suggested Topics within your search.
Suggested Topics within your search.
-
1by Ahmad A.A.I.; Jalil K.A.“…, most researchers are focusing on a defense approach to mitigate these attacks. This approach aims…”
Published in IEEE Symposium on Wireless Technology and Applications, ISWTA (2024)
Get full text
Conference paper -
2by Hata M.B.M.; Darus M.Y.B.; Shafiee M.Z.A.B.; Petrus E.; Jamian Y.A.“…. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding…”
Published in 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023 (2023)
Get full text
Conference paper -
3by Yanmin, Cai; Sarkar, Arindam; Zain, Jasni Mohamad; Bhar, Arindam; Noorwali, Abdulfattah; Othman, Kamal M.“…) to enable mutual learning and enhance key distribution among connected devices, ensuring a strong defense…”
Published in INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2024)
Get full text
Article; Early Access -
4by Yanmin C.; Sarkar A.; Zain J.M.; Bhar A.; Noorwali A.; Othman K.M.“…) to enable mutual learning and enhance key distribution among connected devices, ensuring a strong defense…”
Published in International Journal of Machine Learning and Cybernetics (2024)
Get full text
Article