Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols

Top

Volume 2, Issue 1 (2021) –

Cover Picture: In this paper, the authors propose a methodology that leverages the power consumption of wireless devices and Restricted Boltzmann Machine (RBM) Autoencoders (AE) to build a model that makes them more robust to the presence of security threats. The performance of the proposed methodology shows a good generalization for detecting different security threats, and, hence, confirms the usefulness and applicability of the proposed approach.
view this paper

Original Article

Actions for selected articles

© 2016-2021 OAE Publishing Inc., except certain content provided by third parties