Buscar

Filtrado por: Tema Information Technology Eliminar la restricciónTema: Information Technology

Resultados de la búsqueda

  • Document thumbnail: Extracting Actionable Medical Data from a Twitter User’s History During a Medical Emergency
  • Article thumbnail: IoT Emergency Detection Devices
  • Article thumbnail: Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm
  • Article thumbnail: Implementation of a hybrid machine learning technique for network intrusion detection
  • Article thumbnail: Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
  • Article thumbnail: Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
  • Article thumbnail: Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes
  • Article thumbnail: A methodology for cyberthreat ranking
  • Article thumbnail: Application of Autoencoder Duets in Anomaly and Intrusion Detection
  • Article thumbnail: Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models