Invia i risultati del Security Hub a Security Lake Per inviare i risultati di Security Hub a Security Lake, è necessario abilitare entrambi i servizi e aggiungere i risultati di Security Hub come fonte in Security Lake. Per istruzioni sull'aggiunta di una AWS fonte, vedereAggiungere un fi...
The system was given the term (Intelligent Transportation System) by the researcher. Detection and tokenization methods based on ontologies have been used to preprocess Twitter data as textual context information to identify a real-time crime hub. Then, the value was quantified with IDF extraction a...
In this paper, a comprehensive survey of evolutionary computation (EC) methods for cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are named based on the natural processes inspiring them, such as swarm intelligence (e.g., ant colony optimization, artificial ...
Machine learning and especially deep learning (DL) methods gained importance in many research and application domains. In software engineering, e.g., deep learning is used for analysis and prediction based on software development artifacts, such as commits, issues, documentation, description, and, of...
https://dronehub.ai HIVE. Autonomous Drone Port. https://hive.aero Skycharge. SKYPORT DP5 drone box hangar. https://www.skycharge.de/drone-box-hangar Percepto. Percepto Base. https://percepto.co/air-mobile/ Security, N. https://www.nightingalesecurity.com/specs-faqs/ Campi T, Cruciani...
In recent years, there has been a growing interest in collecting and storing healthcare data which eventually led to a revolution in this field. In fact, the development of IoT-enabled (Internet of Things-enabled) wearable devices like healthcare managem
He is also a co-founder of Trust-Hub. He served as associate Editor-in-Chief (EIC) for IEEE Design and Test of Computers from 2012-2014. He is currently serving as an Associate Editor for IEEE Design and Test of Computers, an Associate Editor for JETTA, an Associate Editor for Journal...
In Malware Analysis Using Artificial Intelligence and Deep Learning; Springer: Berlin/Heidelberg, Germany, 2020; pp. 97–119. [Google Scholar] [CrossRef] Cui, J.; Liew, L.S.; Sabaliauskaite, G.; Zhou, F. A review on safety failures, security attacks, and available countermeasures for ...
4G; 5G; security vulnerabilities; Physical Layer (PHY); machine learning; eavesdropping; jamming; spoofing; localization 1. Introduction With the recent developments of mobile networks, users profit from ubiquitous connectivity, ever-increasing data rates, and a wide range of emerging applications. On...
Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1238–1246. [Google Scholar]...