Internal service of an enterprise admission control
暂无分享,去创建一个
[1] Swati Swayamsiddha,et al. A Review of ONDC's Digital Warfare in India Taking on the e-Commerce Giants , 2022, SSRN Electronic Journal.
[2] Md Meraj Ansari,et al. Threats and Opportunities with AI-based Cyber Security Intrusion Detection: A Review , 2022, International Journal of Software Engineering & Applications.
[3] Md Meraj Ansari,et al. The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review , 2022, IJARCCE.
[4] C. Pradhan,et al. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach , 2022, Sensors.
[5] Ika Hariyanti. HUBUNGAN EFEKTIVITAS PENGENDALIAN INTERNAL TERHADAP ENTERPRISE RESOURCE PLANNING (ERP) PADA KANTOR KONSULTAN CAMILLE SEMARANG , 2022, JAKA (Jurnal Akuntansi, Keuangan, dan Auditing).
[6] Ahmed J. Obaid,et al. Securing e-Health application of cloud computing using hyperchaotic image encryption framework , 2022, Comput. Electr. Eng..
[7] K. Prakash,et al. Particle swarm optimization performance improvement using deep learning techniques , 2022, Multimedia Tools and Applications.
[8] D. Koundal,et al. A fuzzy convolutional neural network for enhancing multi-focus image fusion , 2022, J. Vis. Commun. Image Represent..
[9] Pawan Kumar Sharma,et al. Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training , 2022, International Journal of Smart Sensor and Adhoc Network..
[10] H. Garg,et al. Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network , 2022, Multimedia Tools and Applications.
[11] D. P. Yadav,et al. Bone Cancer Detection Using Feature Extraction Based Machine Learning Model , 2021, Computational and mathematical methods in medicine.
[12] Karan Bajaj,et al. A Comparative Performance Assessment of Optimized Multilevel Ensemble Learning Model with Existing Classifier Models , 2021, Big Data.
[13] Ibrahim S. Alsukayti,et al. An Intelligent Optimized Route-Discovery Model for IoT-Based VANETs , 2021, Processes.
[14] Shivendra Shivani,et al. Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text , 2021, Complex & Intelligent Systems.
[15] Bhisham Sharma,et al. Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data , 2021, Complex & Intelligent Systems.
[16] Dohyeun Kim,et al. A Review on Various Applications of Reputation Based Trust Management , 2021, Int. J. Interact. Mob. Technol..
[17] Bhisham Sharma,et al. A novel dynamic clustering approach for energy hole mitigation in Internet of Things‐based wireless sensor network , 2021, Int. J. Commun. Syst..
[18] Mohammad S. Obaidat,et al. Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions , 2020, Int. J. Commun. Syst..
[19] Ankur Dumka,et al. Performance Analysis of DDoS Attack on SDN and Proposal of Cracking Agorithm , 2020, Int. J. Inf. Technol. Proj. Manag..
[20] Gautam Srivastava,et al. Real-time cheating immune secret sharing for remote sensing images , 2020, Journal of Real-Time Image Processing.
[21] D Babitha,et al. Automated Road Safety Surveillance System using Hybrid CNN-LSTM Approach , 2020 .
[22] Mohammad S. Obaidat,et al. Comparative analysis of IoT based products, technology and integration of IoT with cloud computing , 2020, IET Networks.
[23] Ramya Govindaraj,et al. Optimal feature extraction and classification-oriented medical insurance prediction model: machine learning integrated with the internet of things , 2020, International Journal of Computers and Applications.
[24] Mohammad S. Obaidat,et al. Statistical vertical reduction‐based data abridging technique for big network traffic dataset , 2019, Int. J. Commun. Syst..
[25] Prabhjot Kaur,et al. Network Traffic Classification Using Multiclass Classifier , 2018 .
[26] Fakariah Hani Mohd Ali,et al. Simple port knocking method: Against TCP replay attack and port scanning , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[27] Vijay Kumar Chaurasiya,et al. Advanced port knocking authentication scheme with QRC using AES , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).
[28] Ned Freed,et al. Behavior of and Requirements for Internet Firewalls , 2000, RFC.
[29] Junyu Zhang. On The Impact of Financial Sharing Mode on Enterprise Internal Control -- Taking S Company as An Example , 2022, 2022 2nd International Conference on Management Science and Industrial Economy Development (MSIED 2022).
[30] Bhisham Sharma,et al. A Review to Forest Fires and Its Detection Techniques Using Wireless Sensor Network , 2020 .
[31] Mohammad S. Obaidat,et al. Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes , 2020, Ad Hoc Sens. Wirel. Networks.
[32] Mohammad S. Obaidat,et al. A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things , 2019, Ad Hoc Sens. Wirel. Networks.
[33] Arti Sood,et al. NETWORK ACCESS CONTROL , 2007 .