咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 4 篇 计算机科学与技术...
    • 4 篇 交通运输工程
    • 4 篇 软件工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 航空宇航科学与技...
    • 1 篇 化学工程与技术
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 化学

主题

  • 2 篇 machine learning
  • 2 篇 artificial intel...
  • 1 篇 internet of thin...
  • 1 篇 threat landscape
  • 1 篇 on-board process...
  • 1 篇 cyber security
  • 1 篇 intrusion detect...
  • 1 篇 advanced securit...
  • 1 篇 feature correlat...
  • 1 篇 random forest
  • 1 篇 adaptive routein...
  • 1 篇 detection
  • 1 篇 automated ai res...
  • 1 篇 frame relay
  • 1 篇 ai
  • 1 篇 automated
  • 1 篇 cyber attack
  • 1 篇 human-machine co...
  • 1 篇 low earth orbit
  • 1 篇 light spacecraft

机构

  • 4 篇 network and data...
  • 3 篇 graphic era deem...
  • 3 篇 department of co...
  • 2 篇 network and data...
  • 1 篇 easwari engineer...
  • 1 篇 simula metropoli...
  • 1 篇 university of cu...
  • 1 篇 magellan systems...
  • 1 篇 institute for ge...
  • 1 篇 karpagam college...
  • 1 篇 department of ar...
  • 1 篇 master of comput...
  • 1 篇 psna college of ...
  • 1 篇 ph.d information...
  • 1 篇 kl deemed to be ...
  • 1 篇 u.s. army engine...
  • 1 篇 data science pro...
  • 1 篇 department of co...
  • 1 篇 electrical engin...
  • 1 篇 dr. ambedkar ins...

作者

  • 5 篇 ravikiran madala
  • 4 篇 madala ravikiran
  • 1 篇 geeta s. navale
  • 1 篇 cui hongzhu
  • 1 篇 pundir sumit
  • 1 篇 alderson david l...
  • 1 篇 tuck ef
  • 1 篇 vijayakumar n.
  • 1 篇 linkov igor
  • 1 篇 prashant surgond...
  • 1 篇 sowmya s.r.
  • 1 篇 shyy dj
  • 1 篇 nikshepa t.
  • 1 篇 nikitha yathiraj...
  • 1 篇 nikshepa. t
  • 1 篇 n. jayalakshmi
  • 1 篇 ruchira rawat
  • 1 篇 mohit tiwari
  • 1 篇 rashmi amardeep
  • 1 篇 supriya r. k

语言

  • 6 篇 英文
  • 6 篇 其他
检索条件"机构=Network and Data Center Engineer"
12 条 记 录,以下是1-10 订阅
排序:
Real-Time Cyber Attack Detection Based on Automated Ai Security System  6
Real-Time Cyber Attack Detection Based on Automated Ai Secur...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Madala, Ravikiran Amardeep, Rashmi Sowmya, S.R. Supriya, R.K. Nikshepa, T. Surabhi, K.R. University of Cumberlands Network and Data Center Engineer Ph.D Information Technology DurhamNC United States Dayananda Sagar Academy of Technology and Management Department of Information Science and Engineering Karnataka Bengaluru India
Cyber security tactics must be more potent and cunning due to the complexity of cybercrimes, which is always expanding. This will enable guard components to make real-time decisions that successfully counter sophistic... 详细信息
来源: 评论
Real-Time Cyber Attack Detection Based on Automated Ai Security System
Real-Time Cyber Attack Detection Based on Automated Ai Secur...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Ravikiran Madala Rashmi Amardeep Sowmya. S. R Supriya R. K Nikshepa. T K. R. Surabhi Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina United States Department of Information Science and Engineering Dayananda Sagar Academy of Technology and Management Bengaluru Karnataka India
Cyber security tactics must be more potent and cunning due to the complexity of cybercrimes, which is always expanding. This will enable guard components to make real-time decisions that successfully counter sophistic...
来源: 评论
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model  6
Cognitive Defense Cyber Attack Prediction and Security Desig...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Devadarshini, P.T. Chandrashekar, B. Pundir, Sumit Tiwari, Mohit Madala, Ravikiran Indhuma, E. Easwari Engineering College Department of Artificial Intelligence and Data Science TamilNadu Chennai India St. Martin's Engineering College Department of Computer Science and Engineering Kompalli Telangana Secunderabad India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi India Network and Data Center Engineer Ph.D Information Technology University of Cumberlands DurhamNC United States St.Martln's Engineering College Department of Computer Science and Engineering Telangana Secunderabad India
Companies of all sizes in today's linked digital world are susceptible to cyber dangers. In this study, we provide a novel approach to cyber defence that integrates machine learning with cognitive defensive techni... 详细信息
来源: 评论
Automated AI Research on Cyber Attack Prediction and Security Design  6
Automated AI Research on Cyber Attack Prediction and Securit...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Madala, Ravikiran Vijayakumar, N. Nandini, N. Verma, Shanti Chandvekar, Samidha Devendra Singh, Devesh Pratap Network and Data Center Engineer Ph.D Information Technology University of Cumberlands DurhamNC United States Karpagam College of Engineering Department of Computer Science and Technology Coimbatore India Dr. Ambedkar Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru India L J University Department of Computer Application Gujarat Ahmedabad India Department of Information Technology Maharashtra New Panvel India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India
A fast expanding topic of study on automated AI is focused on the prediction and prevention of cyber-attacks using machine learning algorithms. In this study, we examined the research on applying machine learning algo... 详细信息
来源: 评论
Research and Innovation in Next Generation Security and Privacy in Industry 5.0 Iot  6
Research and Innovation in Next Generation Security and Priv...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Navale, Geeta S. Madala, Ravikiran Managuli, Manjunath Jayalakshmi, N. Kadiravan, G. Rawat, Ruchira Sinhgad Institute of Technology and Science Department of Computer Engineering Maharashtra Pune India Ph.D Information Technology Network and Data Center Engineer University of Cumberlands DurhamNC United States KLS Gogte Institute of Technology Department of Electronics and Communication Engineering Karnataka Belagavi India PSNA College of Engineering and Technology Master of Computer Applications Tamilnadu Dindigul India KL Deemed to Be University Department of Computer Science and Information Technology Andhra Pradsh India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India
The objective of the newest manufacturing paradigm, known as 'Industry 5.0,'is to combine human intelligence with cutting-edge technology like the Internet of Things (IoT), artificial intelligence (AI), and ro... 详细信息
来源: 评论
Research and Innovation to Market Development: Artificial Intelligence in Business
Research and Innovation to Market Development: Artificial In...
收藏 引用
International Conference on Science Technology engineering and Management (ICONSTEM)
作者: Nikitha Yathiraju P. Raman Ravikiran Madala Prashant Surgonda Patil Ashok Kumar S. Ashwin Ph. D in Information Technology University of Cumberlands Kentucky USA Department of Management Studies Panimalar Engineering College Poonamallee Chennai TamilNadu India Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina United States Department of Management Bharati Vidyapeeths IMRDA Sangli Sangli Maharashtra India Department of Mechanical Engineering New Horizon College of Engineering Bangalore Karnataka India
Showcasing has become complicated over the most recent multi decade with the presentation of Artificial Intelligence. Artificial Intelligence Promoting is a strategy of ideally using technology to upgrade client's...
来源: 评论
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model
Cognitive Defense Cyber Attack Prediction and Security Desig...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: P.T. Devadarshini B Chandrashekar Sumit Pundir Mohit Tiwari Ravikiran Madala E. Indhuma Department of Artificial Intelligence and Data Science Easwari Engineering College Chennai TamilNadu India Department Of Computer Science and Engineering St. Martin's Engineering College Kompalli Secunderabad Telangana Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttrakhand India Department of Computer Science and Engineering Bharati Vidyapeeth's College of Engineering Delhi Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina US Department of Computer Science and Engineering St.Martln's Engineering College Secunderabad Telangana India
Companies of all sizes in today's linked digital world are susceptible to cyber dangers. In this study, we provide a novel approach to cyber defence that integrates machine learning with cognitive defensive techni...
来源: 评论
Research and Innovation In Next Generation Security and Privacy In Industry 5.0 Iot
Research and Innovation In Next Generation Security and Priv...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Geeta S. Navale Ravikiran Madala Manjunath Managuli N. Jayalakshmi G. Kadiravan Ruchira Rawat Department of Computer Engineering Sinhgad Institute of Technology and Science Pune Maharashtra India Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina United States Department of Electronics and Communication Engineering KLS Gogte Institute of Technology Belegavi Karnataka India Master of Computer Applications PSNA College of Engineering and Technology Dindigul Tamilnadu India Department of Computer Science and Information Technology KL Deemed to be University Andhra Pradsh India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttrakhand India
The objective of the newest manufacturing paradigm, known as “Industry 5.0,” is to combine human intelligence with cutting-edge technology like the Internet of Things (IoT), artificial intelligence (AI), and robots ...
来源: 评论
Automated AI Research On Cyber Attack Prediction And Security Design
Automated AI Research On Cyber Attack Prediction And Securit...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Ravikiran Madala N. Vijayakumar Nandini N Shanti Verma Samidha Devendra Chandvekar Devesh Pratap Singh Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina United States Department of Computer Science and Technology Karpagam College of Engineering Coimbatore India Department of Computer Science and Engineering Dr. Ambedkar Institute of Technology Bengaluru Karnataka India Department of Computer Application L J University Ahmedabad Gujarat India Department of Information Technology Changu Kana Thakur Arts Commerce and Science College New Panvel (Autonomous) New Panvel Maharashtra India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttrakhand India
A fast expanding topic of study on automated AI is focused on the prediction and prevention of cyber-attacks using machine learning algorithms. In this study, we examined the research on applying machine learning algo...
来源: 评论
Finding shortest and nearly shortest path nodes in large substantially incomplete networks
arXiv
收藏 引用
arXiv 2022年
作者: Kitsak, Maksim Ganin, Alexander Elmokashfi, Ahmed Cui, Hongzhu Eisenberg, Daniel A. Alderson, David L. Korkin, Dmitry Linkov, Igor Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands Network Science Institute Northeastern University BostonMA02115 United States Department of Systems and Information Engineering University of Virginia CharlottesvilleVA22904 United States U.S. Army Engineer Research and Development Center Contractor Concord MA01742 United States Simula Metropolitan Center for Digital Engineering Oslo Norway Bioinformatics and Computational Biology Program Worcester Polytechnic Institute WorcesterMA01609 United States Institute for Genomic Medicine Columbia University Medical Center New YorkNY United States Operations Research Department Naval Postgraduate School MontereyCA93943 United States Data Science Program Worcester Polytechnic Institute WorcesterMA01609 United States Computer Science Department Worcester Polytechnic Institute WorcesterMA01609 United States U.S. Army Engineer Research and Development Center Environmental Laboratory Concord MA01742 United States
Dynamic processes on networks, be it information transfer in the Internet, contagious spreading in a social network, or neural signaling, take place along shortest or nearly shortest paths. Unfortunately, our maps of ... 详细信息
来源: 评论