Technical Report, National Institute of Standards and Technology, Gaithersburg, MD, USA Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. In: Soft computing applications in industry. Springer, pp 373–383 Bennasar M, Hicks Y, Setchi R (2015) ...
(Gaithersburg, MD, USA) in 2002 as a contaminant in cell culture of human fetal retinoblasts, believed to be introduced through the bovine serum or porcine trypsin that was in the culture media.1 When SVV-001 was first isolated, purified, and analyzed, it had a similar profile to the ...
For this reason, AI is increasingly being integrated into the cybersecurity fabric and used in a variety of use cases to automate security tasks or support the work of human security teams. The flourishing field of cybersecurity and the growing enthusiasm of researchers from both AI and cyber...
Heterogeneous computing refers to architectures that allow the use of different hardware types to work efficiently and cooperatively together. Unlike traditional cloud infrastructure built on the same processor architecture, heterogeneity assumes use of different or dissimilar processors or cores that incorporat...
(Gaithersburg, MD, USA) in 2002 as a contaminant in cell culture of human fetal retinoblasts, believed to be introduced through the bovine serum or porcine trypsin that was in the culture media.1 When SVV-001 was first isolated, purified, and analyzed, it had a similar profile to the ...
In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 220–225. [Google Scholar] [CrossRef] Hug, G.; Giampapa, J.A. Vulnerability Assessment of AC State Estimation with Respect to False Data Injection Cyber...
especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the respon...
Considerations for Digital Twin Technology and Emerging Standards; NIST Internal or Interagency Report (NISTIR) 8356 (Draft); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021. [CrossRef] Atkinson, C.; Kuhne, T. Taming the Complexity of Digital Twins. IEEE Softw. 2021...
Capital Facilities Industry; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2004. [Google Scholar] McArthur, J.J.; Bortoluzzi, B. Lean-Agile FM-BIM: A Demonstrated Approach. Facilities 2018, 36, 676–695. [Google Scholar] [CrossRef] Vieira, R.; Carreira, P.; ...
Barrett, M.P.Framework for Improving Critical Infrastructure Cybersecurity; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2018. Available online:https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf(accessed on 27 March 2023). ...