|
|
|
Tala Talaei Khoei and Naima Kaabouch
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these a...
ver más
|
|
|
|
|
|
Junjie Deng and Hongze Yu
Coastal and estuarine morphogenetic evolution has been affected by anthropogenic activities. Human activities have become an important external force for the future prediction of morphological evolution in ecosystem health. We have reviewed the existing ...
ver más
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|
|
|
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence...
ver más
|
|
|
|
|
|
Heba Aly Elzeheiry, Sherief Barakat and Amira Rezk
In recent years, medical data have vastly increased due to the continuous generation of digital data. The different forms of medical data, such as reports, textual, numerical, monitoring, and laboratory data generate the so-called medical big data. This ...
ver más
|
|
|