咨询与建议

限定检索结果

文献类型

  • 7 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 信息与通信工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 3 篇 network coding
  • 2 篇 internet of thin...
  • 2 篇 lattices
  • 2 篇 relays
  • 2 篇 physical layer
  • 2 篇 computational mo...
  • 2 篇 cryptography
  • 1 篇 power demand
  • 1 篇 delays
  • 1 篇 law
  • 1 篇 feature extracti...
  • 1 篇 electric potenti...
  • 1 篇 receivers
  • 1 篇 machine learning
  • 1 篇 payloads
  • 1 篇 hardware
  • 1 篇 learning (artifi...
  • 1 篇 accuracy
  • 1 篇 open systems

机构

  • 2 篇 department of co...
  • 2 篇 dep. of medical ...
  • 2 篇 department of co...
  • 2 篇 institute of com...
  • 2 篇 department of te...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 dep. of electric...
  • 1 篇 information tech...
  • 1 篇 university of za...
  • 1 篇 dep. of business...
  • 1 篇 dep. of electric...
  • 1 篇 dep. information...
  • 1 篇 dep. of cyber se...
  • 1 篇 trine university...
  • 1 篇 yarmouk universi...
  • 1 篇 dep. computer sc...
  • 1 篇 dep. of computer...
  • 1 篇 concordia univer...
  • 1 篇 dep. of computer...

作者

  • 3 篇 eduard a. jorswi...
  • 3 篇 stefan pfennig
  • 3 篇 elke franz
  • 2 篇 ahmed aziz
  • 2 篇 yousif i hammadi
  • 2 篇 mohammed saleh a...
  • 2 篇 ammar muthanna
  • 2 篇 christian scheun...
  • 2 篇 johannes richter
  • 2 篇 omar abdulkareem...
  • 1 篇 emhamed al mamlo...
  • 1 篇 aws zuhair samee...
  • 1 篇 alzu'bi dalia
  • 1 篇 abla suliman hus...
  • 1 篇 almatarneh satta...
  • 1 篇 qais al-na'amneh
  • 1 篇 mohammed hasan a...
  • 1 篇 hasan gharaibeh
  • 1 篇 ahmed mahmood kh...
  • 1 篇 aljaidi mohammad

语言

  • 7 篇 英文
检索条件"机构=Dep. of Computer Science/Privacy and Data Security"
7 条 记 录,以下是1-10 订阅
排序:
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International Engineering Conference on
作者: Qais Al-Na'amneh Mohammad Aljaidi Hasan Gharaibeh Ahmad Nasayreh Rabia Emhamed Al Mamlook Sattam Almatarneh Dalia Alzu'bi Abla Suliman Husien Dep. of Cyber Security Applied Science Private University Amman Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Business Administration Trine University Indiana USA Department of Industrial Engineering University of Zawia Tripoli Libia Dep. of Data Science and Artificial Intelligence Zarqa University Zarqa Jordan Dep. Information and Systems Engineering Concordia University Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A “spoofing attack” refers to a type of cyber-attack ... 详细信息
来源: 评论
Convolutional Neural Network Based Deep Neural Network Model for Electrocardiogram Records Classification  23
Convolutional Neural Network Based Deep Neural Network Model...
收藏 引用
Proceedings of the 7th International Conference on Future Networks and Distributed Systems
作者: Ahmed Mahmood Khudhur Mohammed Hasan Alwan Qayssar Al Omairi Omar Abdulkareem Mahmood Yousif I Hammadi Mohammed Saleh Ali Muthanna Ahmed Aziz Ammar Muthanna Information Technology Department Kirkuk University Iraq Department of Communications Engineering University of Diyala Iraq Department of Computer Engineering University of Diyala Iraq Dep. of Medical Instruments Engineering Techniques Bilad Alrafidain University College Iraq Institute of Computer Technologies and Information Security Southern Federal University Russia Department of computer science Benha university Egypt and International Business Management Department Tashkent State University of Economics Uzbekistan Department of Telecommunication Networks and Data Transmission The Bonch Bruevich Saint Petersburg State University of Telecommunications Russia and Department of Applied Probability and Informatics Peoples Friendship University of Russia Russia
Сardiovascular diseases, also known as CVDs, currently rank as the primary incidence of mortality. The present approach for identifying illnesses involves the analysis of the Electrocardiogram (ECG), an electronic di...
来源: 评论
Various Modulation Types Classification on the Air by Convolutional Neural Network  23
Various Modulation Types Classification on the Air by Convol...
收藏 引用
Proceedings of the 7th International Conference on Future Networks and Distributed Systems
作者: Yousif I Hammadi Mokhalad Abdulameer Kadhim Alsaeedi Omar Abdulkareem Mahmood Aws Zuhair Sameen Mohammed Saleh Ali Muthanna Ahmed Aziz Ammar Muthanna Dep. of Medical Instruments Engineering Techniques Bilad Alrafidain University College Iraq Department of Communications Engineering University of Diyala Iraq Department of Medical Instrumentation Engineering Techniques Al-Farahidi University Iraq Institute of Computer Technologies and Information Security Southern Federal University Russia Department of computer science Benha university Egypt and International Business Management Department Tashkent State University of Economics Uzbekistan Department of Telecommunication Networks and Data Transmission The Bonch Bruevich Saint Petersburg State University of Telecommunications Russia and Department of Applied Probability and Informatics Peoples Friendship University of Russia Russia
Deep learning (DL), a relatively recent AI technique, has been successfully applied to the problem of automated modulation categorization (AMC), with promising results. An essential part of developing the spectrum-sen...
来源: 评论
Energy Models for Communication of Future Computing Platforms
Energy Models for Communication of Future Computing Platform...
收藏 引用
IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
作者: Elke Franz Stefan Pfennig Bho Matthiesen Christian Scheunert Eduard A. Jorswieck Dep. of Computer Science/Privacy and Data Security Dep. of Electrical Engineering and Information Technology/Communications Laboratory Technische Universität Dresden Dresden Germany
Energy efficiency is an essential requirement on future computer architectures. Thereby, the efficiency of the communication will play an important role. Within this paper, we present an energy model for a unicast mul... 详细信息
来源: 评论
Confidential Network Coding: Physical Layer vs. Network Layer
Confidential Network Coding: Physical Layer vs. Network Laye...
收藏 引用
IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
作者: Stefan Pfennig Elke Franz Johannes Richter Christian Scheunert Eduard A. Jorswieck Dep. of Computer Science/Privacy and Data Security Technische Universitat Dresden Dresden Germany Dep. of Electrical Engineering and Information Technology Technische Universitat Dresden Dresden Germany
In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure t... 详细信息
来源: 评论
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Physical layer security vs. network layer secrecy: Who wins ...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Johannes Richter Elke Franz Sabrina Engelmann Stefan Pfennig Eduard A. Jorswieck Dep. of Electrical Engineering and Information Technology/Communications Laboratory Dep. of Computer Science/Privacy and Data Security Technische Universität Dresden Dresden Germany
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ... 详细信息
来源: 评论