咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 10 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 电气工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
  • 5 篇 理学
    • 3 篇 数学
    • 2 篇 系统科学
    • 1 篇 化学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
    • 1 篇 理论经济学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 1 篇 internet of thin...
  • 1 篇 covid-19
  • 1 篇 clustering
  • 1 篇 data privacy
  • 1 篇 dynamic networks
  • 1 篇 social network a...
  • 1 篇 bluetooth
  • 1 篇 knowledge
  • 1 篇 innovation
  • 1 篇 electroencephalo...
  • 1 篇 robotic surgery
  • 1 篇 graphics process...
  • 1 篇 topic modeling
  • 1 篇 predictive analy...
  • 1 篇 bitcoin
  • 1 篇 random forest cl...
  • 1 篇 cryptocurrency
  • 1 篇 smart cities
  • 1 篇 unmanned aerial ...
  • 1 篇 digital storage

机构

  • 4 篇 cybersecurity an...
  • 2 篇 priam cyber ai l...
  • 2 篇 donders institut...
  • 2 篇 cyber security r...
  • 2 篇 department of co...
  • 2 篇 cybersecurity in...
  • 2 篇 university of he...
  • 2 篇 cybersecurity in...
  • 1 篇 amrita school of...
  • 1 篇 department of ea...
  • 1 篇 director innovat...
  • 1 篇 centre for smart...
  • 1 篇 pattern recognit...
  • 1 篇 centre for smart...
  • 1 篇 singidunum unive...
  • 1 篇 amrita school fo...
  • 1 篇 monash e-researc...
  • 1 篇 cybersecurity an...
  • 1 篇 new era and deve...
  • 1 篇 university of li...

作者

  • 5 篇 chang victor
  • 3 篇 mahmood fazlali
  • 3 篇 fazlali mahmood
  • 2 篇 ghanem mohamed c...
  • 2 篇 el-hajjar ayman
  • 2 篇 bahar farahani
  • 2 篇 mohammadnavid gh...
  • 2 篇 ratnayake deepth...
  • 1 篇 rauf hafiz tayya...
  • 1 篇 mounir hamdi
  • 1 篇 tabani myasar
  • 1 篇 farahani bahar
  • 1 篇 doan le minh tha...
  • 1 篇 yousefpoor moham...
  • 1 篇 seifedine kadry
  • 1 篇 hall karl
  • 1 篇 rashid tarik a.
  • 1 篇 aurangzeb khursh...
  • 1 篇 gao xianghua
  • 1 篇 ghader mohammadn...

语言

  • 18 篇 英文
  • 1 篇 其他
检索条件"机构=Cybersecurity and Computing Systems Research Group"
19 条 记 录,以下是1-10 订阅
排序:
AI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in Cloud Environments
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2025年 3卷 623-643页
作者: Farzaan, Mohammed A. M. Ghanem, Mohamed Chahine El-Hajjar, Ayman Ratnayake, Deepthi N. PRIAM CYBER AI Limited London United Kingdom University of Liverpool Cybersecurity Institute Liverpool United Kingdom Cyber Security Research Centre London Metropolitan University United Kingdom University of Westminster Cyber Security Research Group London United Kingdom Cybersecurity and Computing Systems Research Group University of Hertfordshire Hatfield United Kingdom
The growing complexity and frequency of cyber threats in cloud environments call for innovative and automated solutions to maintain effective and efficient incident response. This study tackles this urgent issue by in... 详细信息
来源: 评论
Ethical discussions for autonomous robotic surgeries  2
Ethical discussions for autonomous robotic surgeries
收藏 引用
2nd International Conference on Industrial IoT, Big Data, and Supply Chain 2021
作者: Chang, Victor Kamanooru, Mohana R. Darko, Gilbert Tsibu Cybersecurity Information Systems and AI Research Group School of Computing Teesside University Middlesbrough United Kingdom
Artificial Intelligence is extensively applied and evolving in every field with emerging new techniques and approaches. Similarly, in the health care sector, robotic surgeries are expanding too. The significant leap f... 详细信息
来源: 评论
Ethical issues with development status of modern agricultural production  2
Ethical issues with development status of modern agricultura...
收藏 引用
2nd International Conference on Industrial IoT, Big Data, and Supply Chain 2021
作者: Chang, Victor Gao, Xianghua Cybersecurity Information Systems and AI Research Group School of Computing Teesside University Middlesbrough United Kingdom
This article analyzes the legally collected real data and explains the analysis process and results of the unregulated third-party traceable agricultural product sales data in the current environment. We use a hybrid ... 详细信息
来源: 评论
Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic”
收藏 引用
IEEE Access 2025年 13卷 5436-5436页
作者: M. Poongodi Mohit Malviya Mounir Hamdi Hafiz Tayyab Rauf Seifedine Kadry Orawit Thinnukool College of Science and Engineering Hamad Bin Khalifa University Qatar Foundation Doha Qatar Department of CTO 5G Wipro Ltd. Bengaluru India Centre for Smart Systems AI and Cybersecurity Staffordshire University Stoke-on-Trent U.K. Faculty of Applied Computing and Technology Noroff University College Kristiansand Norway Research Group of Embedded Systems and Mobile Application in Health Science College of Arts Media and Technology Chiang Mai University Chiang Mai Thailand
Presents corrections to the paper, (Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic”).
来源: 评论
Parallel Image Encryption Algorithm Using Partitioned Cellular Automata on Graphic Processor Unit
Parallel Image Encryption Algorithm Using Partitioned Cellul...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent systems, COINS 2023
作者: Fazlali, Mahmood Alihoseini, Amirhossein Zarei, Ebrahim Tabani, Myasar Pourmoafi, Seyedali University of Hertfordshire Cybersecurity and Computing Systems Research Group Hatfield United Kingdom Shahid Beheshti University Faculty of Mathematical Sciences Dept. of Data and Computer Sciensce Tehran Iran Khansar Campus University of Isfahan Dep. of Computer Science Isfahan Iran
Image encryption is a reliable method for securely transmitting images over a network. The time required to encrypt and decrypt an image in online applications is also very important. Although cellular automata crypto... 详细信息
来源: 评论
Exploiting Federated Learning for EEG-based Brain-Computer Interface System
Exploiting Federated Learning for EEG-based Brain-Computer I...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent systems, COINS 2023
作者: Ghader, Mohammadnavid Farahani, Bahar Rezvani, Zahra Shahsavari, Mahyar Fazlali, Mahmood Shahid Beheshti University Department of Computer Science Tehran Iran Cyberspace Research Institute Shahid Beheshti University Tehran Iran Tehran Iran Alzahra University Department of Computer Science Tehran Iran Donders Institute Radboud University Nijmegen Netherlands University of Hertfordshire Cybersecurity and Computing Systems Research Group Hatfield United Kingdom
Motor imagery (MI) is a widely used technique in brain-computer interface (BCI) systems, which allows users to control external devices using their brain signals. Electroen-cephalogram (EEG) signals are commonly used ... 详细信息
来源: 评论
Enabling Privacy-Preserving Edge AI: Federated Learning Enhanced with Forward-Forward Algorithm
Enabling Privacy-Preserving Edge AI: Federated Learning Enha...
收藏 引用
Omni-layer Intelligent systems (COINS), International Conference on
作者: Mohammadnavid Ghader Saeed Reza Kheradpisheh Bahar Farahani Mahmood Fazlali Department of Computer Science Shahid Beheshti University Tehran Iran Cybersecurity and Computing Systems Research Group University of Hertfordshire Hatfield United Kingdom
Artificial Intelligence (AI) has emerged as a pivotal technology across various sectors, including healthcare, trans-portation, and the development of smart cities, revolutionizing service delivery and operational eff... 详细信息
来源: 评论
Smart Homes Under Siege: Assessing the Robustness of Physical Security Against Cyber Attackers
SSRN
收藏 引用
SSRN 2023年
作者: Allen, Ashley Mylonas, Alexios Vidalis, Stilianos Gritzalis, Dimitris Cybersecurity and Computing Systems Research Group Dept. of Computer Science University of Hertfordshire United Kingdom Dept. of Informatics Athens University of Economics & Business Greece
Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to ease of use, conve­nien­ce, and declining prices. Un... 详细信息
来源: 评论
AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments
arXiv
收藏 引用
arXiv 2024年
作者: Farzaan, Mohammed Ashfaaq M. Ghanem, Mohamed Chahine El-Hajjar, Ayman Ratnayake, Deepthi N. PRIAM CYBER AI Limited London United Kingdom Department of Computer Science University of Liverpool Liverpool United Kingdom Cyber Security Research Centre London Metropolitan University United Kingdom Cyber Security Research Group University of Westminster London United Kingdom Cybersecurity and Computing Systems Research Group University of Hertfordshire Hatfield United Kingdom
The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research ex... 详细信息
来源: 评论
Parallel Image Encryption Algorithm Using Partitioned Cellular Automata on Graphic Processor Unit
Parallel Image Encryption Algorithm Using Partitioned Cellul...
收藏 引用
Omni-layer Intelligent systems (COINS), International Conference on
作者: Mahmood Fazlali Amirhossein Alihoseini Ebrahim Zarei Myasar Tabani Seyedali Pourmoafi Cybersecurity and Computing Systems Research Group University of Hertfordshire Hatfiled UK Dept. of data and Computer Sciensce Faculty of Mathematical sciences Shahid Beheshti University Tehran Iran Dep. of Computer Science Khansar Campus University Of Isfahan Isfahan Iran
Image encryption is a reliable method for securely transmitting images over a network. The time required to encrypt and decrypt an image in online applications is also very important. Although cellular automata crypto...
来源: 评论