|

Reviews about "General (C.2.0)":
|
Date Reviewed |
ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning Han X., Cui S., Qin J., Liu S., Jiang B., Dong C., Lu Z., Liu B. Proc. of the ACM Web Conference (WWW 2024)May 13-17, 2024) 1680-1689, 2024. Type: Proceedings
|
Jul 19 2024 |
Beginning AWS security: build secure, effective, and efficient AWS architecture Penwell T., Apress, New York, NY, 2023. 152 pp. Type: Book (148429680X)
|
Mar 4 2024 |
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022. Type: Article
|
Feb 8 2024 |
Potential technologies and applications based on deep learning in the 6G networks Zheng Z., Wang L., Zhu F., Liu L. Computers and Electrical Engineering 951-8, 2021. Type: Article
|
Apr 4 2023 |
5G wireless: a comprehensive introduction Stallings W., Pearson, Hoboken, NJ, 2021. 672 pp. Type: Book (978-1-367671-41-6)
|
Sep 20 2022 |
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE Li N., Yan Z., Wang M., Yang L. ACM Transactions on Cyber-Physical Systems 3(1): 1-23, 2018. Type: Article
|
Apr 28 2022 |
Computer networks: a systems approach, sixth edition Peterson L., Davie B., ACADEMIC PRESS, Cambridge, MA, 2021. 848 pp. Type: Book (978-1-281820-08-2)
|
Apr 20 2022 |
more...
|
|
|
|