Hybrid intrusion detection system using machine learning. | 1 | 0.35 | 2020 |
Weighted Lstm For Intrusion Detection And Data Mining To Prevent Attacks | 0 | 0.34 | 2020 |
Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks. | 0 | 0.34 | 2018 |
Towards A new Spam Filter Based on PV-DM (Paragraph Vector-Distributed Memory Approach). | 0 | 0.34 | 2017 |
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. | 0 | 0.34 | 2017 |
A Binary-Based Mapreduce Analysis For Cloud Logs | 1 | 0.39 | 2016 |
Managing cloud-generated logs using big data technologies | 3 | 0.45 | 2015 |
Secured Geographic Routing Protocol for Vehicular Ad Hoc Networks (VANETs). | 0 | 0.34 | 2013 |
A beaconing approach whith key exchange in vehicular ad hoc networks | 1 | 0.35 | 2012 |
Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations | 4 | 0.39 | 2012 |
UML modelling of geographic | 0 | 0.34 | 2012 |
A Contribution to Secure the | 0 | 0.34 | 2011 |
2wards QoS-capable ODP computational interfaces | 0 | 0.34 | 2009 |
Interaction Signatures and Action Templates in the ODP Computational Viewpoint. | 1 | 0.63 | 2006 |
An UML-Based Meta-Language for the QOS-Aware Enterprise Specification of Open Distributed Systems | 3 | 0.48 | 2002 |
The Internet is Challenging the Intelligent Network | 0 | 0.34 | 2000 |