Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Article
Application of Computer Network Technology in Network Music Education SystemMobile Information Systems10.1155/2022/8754424 Article
Article
Conference
Advance Model For Ransomware Attacking Data Classification And Prediction Using Ai2023 1st International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP)10.1109/IHCSP56702.2023.10127199 Article
A Graph Theory Based Self-Learning Honeypot to Detect Persistent ThreatsIntelligent Automation & Soft Computing10.32604/iasc.2023.028029 Article
Self-co-ordination algorithm (SCA) for multi-UAV systems using fair scheduling queueSensor Review10.1108/SR-01-2022-0003 Conference
A New Method for Ransomware Detection Based on PE Header Using Convolutional Neural Networks2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)10.1109/ISCISC51277.2020.9261903 Article
Cyber Security Attacks Detecting Thread in the Virtual World of Corporate SectorsInternational Journal of Case Studies in Business, IT, and Education10.47992/IJCSBE.2581.6942.0261
Close Top Results From Your Most Recent Search
Close