Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security
暂无分享,去创建一个
[1] Aderemi Oluyinka Adewumi,et al. Improved Instance Selection Methods for Support Vector Machine Speed Optimization , 2017, Secur. Commun. Networks.
[2] Shahzad Qaiser,et al. Text Mining: Use of TF-IDF to Examine the Relevance of Words to Documents , 2018, International Journal of Computer Applications.
[3] Donald E. Brown,et al. HDLTex: Hierarchical Deep Learning for Text Classification , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[4] Hassan N. Noura,et al. Cyber-physical systems security: Limitations, issues and future trends , 2020, Microprocessors and Microsystems.
[5] M. K. Kavitha Devi,et al. A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks , 2020, Wireless Personal Communications.
[6] S ManoharNaik,et al. A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System , 2016 .
[7] Hao Chen,et al. Mitosis Detection in Breast Cancer Histology Images via Deep Cascaded Networks , 2016, AAAI.
[8] Jong Hyuk Park,et al. A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing , 2017, Microprocess. Microsystems.
[9] Shasha Wang,et al. Deep feature weighting for naive Bayes and its application to text classification , 2016, Eng. Appl. Artif. Intell..
[10] Pratistha Mathur,et al. Efficient image steganography using graph signal processing , 2018, IET Image Process..
[11] K. Thenmozhi,et al. Quantum polarized image encryption — A secure communication , 2017, 2017 International Conference on Computer Communication and Informatics (ICCCI).
[12] Yogesh Palanichamy,et al. Securing VPN from insider and outsider bandwidth flooding attack , 2020, Microprocess. Microsystems.
[13] Binod Kumar Pattanayak,et al. Prevention of Replay Attack Using Intrusion Detection System Framework , 2019 .
[14] Kartik Shankar,et al. An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .
[15] Kichun Lee,et al. Opinion mining using ensemble text hidden Markov models for text classification , 2018, Expert Syst. Appl..
[16] R. Santhana Krishnan,et al. Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks , 2019, Wireless Networks.
[17] Bhaskar Mondal,et al. Cryptographic Image Scrambling Techniques , 2018, Cryptographic and Information Security.
[18] S. O. Abdulsalam. Text Classification Using Data Mining Techniques: A Review , 2018 .
[19] Athanasios V. Vasilakos,et al. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.
[20] Yilong Yin,et al. Deep learning model based breast cancer histopathological image classification , 2017, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).
[21] Junqi Yang,et al. Observer-Based Synchronization of Chaotic Systems Satisfying Incremental Quadratic Constraints and Its Application in Secure Communication , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[22] Virginijus Marcinkevičius,et al. Comparison of Naive Bayes, Random Forest, Decision Tree, Support Vector Machines, and Logistic Regression Classifiers for Text Reviews Classification , 2017, Balt. J. Mod. Comput..
[23] Sunil Kumar Khatri,et al. A Security Model for the Enhancement of Data Privacy in Cloud Computing , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).
[24] Suyel Namasudra,et al. An improved attribute‐based encryption technique towards the data security in cloud computing , 2019, Concurr. Comput. Pract. Exp..
[25] Rajendra Gupta,et al. Experimental Analysis of Browser based Novel Anti-Phishing System Tool at Educational Level , 2016 .