Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

The paper's citation list
No.The paper's citation list
1An AI-Enabled Approach in Analyzing Media Data: An Example from Data on COVID-19 News Coverage in Vietnam. 2021;6:70 doi: 10.3390/data6070070
2978-1-6654-7330-9 Active Lifelong Anomaly Detection with Experience Replay; 2022; 2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA);1 doi: 10.1109/DSAA54385.2022.10032405
3Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems. 2023;1: doi: 10.1007/s44248-023-00002-y
4SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection. 2022;10:56952 doi: 10.1109/ACCESS.2022.3177272
© 2016-2023 OAE Publishing Inc., except certain content provided by third parties