Auswahl der wissenschaftlichen Literatur zum Thema „Cyber Algorithm“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cyber Algorithm" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Cyber Algorithm"

1

Manas Kumar Yogi and Dwarampudi Aiswarya. "Designing Greedy Algorithm for Cyber Threat Detection." Journal of ISMAC 5, no. 3 (2023): 200–218. http://dx.doi.org/10.36548/jismac.2023.3.002.

Der volle Inhalt der Quelle
Annotation:
As the digital landscape continues to expand, the complexity and frequency of cyber threats targeting critical information systems also increases. Effective cyber threat detection has become a paramount concern for safeguarding sensitive data and ensuring the uninterrupted operation of various infrastructures. This research introduces a novel approach to cyber threat detection through the design of a greedy algorithm tailored for identifying specific types of threats. The algorithm focuses on a simplified aspect of threat detection, aiming to highlight the potential of greedy algorithms in con
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.

Der volle Inhalt der Quelle
Annotation:
A recent study (Yin et al., 2010) showed that combining particle swarm optimization (PSO) with the strategies of scatter search (SS) and path relinking (PR) produces a Cyber Swarm Algorithm that creates a more effective form of PSO than methods that do not incorporate such mechanisms. This paper proposes a Complementary Cyber Swarm Algorithm (C/CyberSA) that performs in the same league as the original Cyber Swarm Algorithm but adopts different sets of ideas from the tabu search (TS) and the SS/PR template. The C/CyberSA exploits the guidance information and restriction information produced in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Rahman, S. R. "A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 2 (2022): 79–85. http://dx.doi.org/10.17762/ijfrcsce.v8i2.2081.

Der volle Inhalt der Quelle
Annotation:
Businesses are using cyber security technologies more and more to upgrade their operations. These businesses are prone to hazards and cyber security breaches because to the very specialized characteristics of such settings, including their sensitive exchange of cyber security data and the weak design of connected devices. Our main goal is to develop a cyber security system that can take into account all potential forms of assaults while staying within the allocated budget. To achieve this, a financial strategy based on portfolio management is utilized by enabling the selection of a portfolio o
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zaki Abdullah, Mahmood, Ali Kalid Jassim, Fadia Noori Hummadi, and Mohammed Majid M. Al Khalidy. "NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS." Journal of Engineering and Sustainable Development 28, no. 3 (2024): 342–54. http://dx.doi.org/10.31272/jeasd.28.3.4.

Der volle Inhalt der Quelle
Annotation:
Gradually, since the number of linked computer systems that use networks linked to the Internet is raised the information that is delivered through those systems becomes more vulnerable to cyber threats. This article presents proposed algorithms based on Machine Learning (ML) that ensure early detection of cyber threats that cause network breaking through the use of the Correlation Ranking Filter feature selection method. These proposed algorithms were applied to the Multi-Step Cyber-Attack Dataset (MSCAD) which consists of 66 features. The proposed strategy will apply machine learning algorit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

KACHYNSKYI, A., D. VARYCHEVA, and S. SVYRYDENKO. "Quantitative assessments of cyber security system priorities." INFORMATION AND LAW, no. 2(17) (June 29, 2016): 114–26. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272912.

Der volle Inhalt der Quelle
Annotation:
The algorithm of a choice of rational cyber security structure with elements of potential cyber threats in a high probability of their realization is proposed. The algorithm is based on the analysis of hierarchical structures. The article discusses the basic cyber threats and evaluation of local and global priorities of cyber security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Son, Vu Ngoc. "Optimizing Network Anomaly Detection Based on Network Traffic." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 53–60. http://dx.doi.org/10.46338/ijetae1121_07.

Der volle Inhalt der Quelle
Annotation:
Cyber-attack is a very hot topic today. Nowadays, systems must always be connected to the internet, and network infrastructure keeps growing in both scale and complexity. Therefore, the problem of detecting and warning cyber-attacks is now very urgent. To improve the effectiveness of detecting cyber-attacks, many methods and techniques were applied. In this paper, we propose to apply two methods of optimizing cyber-attack detection based on the IDS 2018 dataset using Principal Component Analysis (PCA) and machine learning algorithms. In the experimental section, we compare and evaluate the eff
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Amin, Reham, Ghada El-Taweel, Ahmed Fouad Ali, and Mohamed Tahoun. "A Hybrid Extreme Gradient Boosting and Long Short-Term Memory Algorithm for Cyber Threats Detection." MENDEL 29, no. 2 (2023): 307–22. http://dx.doi.org/10.13164/mendel.2023.2.307.

Der volle Inhalt der Quelle
Annotation:
The vast amounts of data, lack of scalability, and low detection rates of traditional intrusion detection technologies make it impossible to keep up with evolving and increasingly sophisticated cyber threats. Therefore, there is an urgent need to detect and stop cyber threats early. Deep Learning has greatly improved intrusion detection due to its ability to self-learn and extract highly accurate features. In this paper, a Hybrid XG Boosted and Long Short-Term Memory algorithm (HXGBLSTM) is proposed. A comparative analysis is conducted between the computational performance of six established e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Jin, Zengwang, Menglu Ma, Shuting Zhang, Yanyan Hu, Yanning Zhang, and Changyin Sun. "Secure State Estimation of Cyber-Physical System under Cyber Attacks: Q-Learning vs. SARSA." Electronics 11, no. 19 (2022): 3161. http://dx.doi.org/10.3390/electronics11193161.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a reinforcement learning (RL) algorithm for the security problem of state estimation of cyber-physical system (CPS) under denial-of-service (DoS) attacks. The security of CPS will inevitably decline when faced with malicious cyber attacks. In order to analyze the impact of cyber attacks on CPS performance, a Kalman filter, as an adaptive state estimation technology, is combined with an RL method to evaluate the issue of system security, where estimation performance is adopted as an evaluation criterion. Then, the transition of estimation error covariance under a DoS attack
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Korystin, Оleksandr, Svyrydiuk Nataliia, and Olena Mitina. "Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm." International Journal of Computer Network and Information Security 14, no. 4 (2022): 1–13. http://dx.doi.org/10.5815/ijcnis.2022.04.01.

Der volle Inhalt der Quelle
Annotation:
The paper focuses on the study of cyber security in Ukraine and creation of a predictive model for reducing the risk of identified cyber threats. Forecasting is performed using a linear regression model, taking into account the optimal dependence of specific threats in the field of cyber security of Ukraine on variables characterizing capabilities / vulnerabilities of cyber security. An unique empirical base was used for the analysis, which was formed on the basis of an expert survey of the cyber security system’s subjects in Ukraine. In order to increase the representativeness of the research
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Liu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.

Der volle Inhalt der Quelle
Annotation:
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Cyber Algorithm"

1

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Der volle Inhalt der Quelle
Annotation:
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Roychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Guymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.

Der volle Inhalt der Quelle
Annotation:
The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people. The two specific problems are 1) determining when people are going to arrive late to a meeting and 2) creating ad-hoc secure pairing protocols for short-range communication. The domain was broken down at opposite extremes in order to derive these problems to work on: 1) collaborations that are planned long in advance and deviations from the plan need to be detected and 2) collaborations that are not planned and need t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.

Der volle Inhalt der Quelle
Annotation:
Doctor of Philosophy<br>Department of Computing and Information Sciences<br>Gurdip Singh<br>In this dissertation, we propose a cyber-physical system model, and based on this model, present algorithms for a set of distributed computing problems. Our model specifies a cyber-physical system as a combination of cyber-infrastructure, physical-infrastructure, and user behavior specification. The cyber-infrastructure is superimposed on the physical-infrastructure and continuously monitors its (physical-infrastructure's) changing state. Users operate in the physical-infrastructure and interact with th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Furrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.

Der volle Inhalt der Quelle
Annotation:
In algorithmic computing, the program follows a predefined set of rules – the algorithm. The analyst/designer of the program analyzes the intended tasks of the program, defines the rules for its expected behaviour and programs the implementation. The creators of algorithmic software must therefore foresee, identify and implement all possible cases for its behaviour in the future application! However, what if the problem is not fully defined? Or the environment is uncertain? What if situations are too complex to be predicted? Or the environment is changing dynamically? In many such cases algor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.

Der volle Inhalt der Quelle
Annotation:
L'utilisation des téléphones intelligents, le recours aux assistants personnels intelligents ou encore le développement des maisons intelligentes sont autant d'exemples illustrant le développement toujours plus rapide de l'informatique ubiquitaire, de l'Internet des objets et de l'intelligence artificielle. Le croisement des résultats issus de ces domaines de recherche contribue à changer notre quotidien et constitue un environnement fertile pour de nouveaux travaux. Ainsi, l’intégration des entités cyber-physiques dans des environnements sociaux de différentes échelles allant des maisons aux
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Staub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.

Der volle Inhalt der Quelle
Annotation:
Les dernières années ont vu le développement de recherches portant sur l'interaction physique entre les robots aériens et leur environnement, accompagné de l'apparition de nombreux nouveaux systèmes mécaniques et approches de régulation. La communauté centrée autour de la robotique aérienne observe actuellement un déplacement de paradigmes des approches classiques de guidage, de navigation et de régulation vers des tâches moins triviales, telle le développement de l'interaction physique entre robots aériens et leur environnement. Ceci correspond à une extension des tâches dites de manipulation
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Der volle Inhalt der Quelle
Annotation:
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and comput
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Rukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.

Der volle Inhalt der Quelle
Annotation:
Dans le cadre de cette thèse, une approche de calcul de couplage multi-échelle et multi-physique en 2D et en 3D est présentée. La modélisation multi-échelle d’une structure consiste de l’échelle macro qui représente la réponse homogénéisée de la structure entière, tandis que l’échelle micro peut capturer les détails du comportement à la petite échelle du matériau, où des mécanismes inélastiques, tels que la plasticité ou l’endommagement, peuvent être pris en compte. L’intérieur de chaque macro-élément est rempli par le maillage à l’échelle micro qui s’y adapte entièrement. Les deux échelles so
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Cyber Algorithm"

1

Dusadeerungsikul, Puwadol Oak, and Shimon Y. Nof. Cyber-Collaborative Algorithms and Protocols. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-56196-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kravets, Alla G., Alexander A. Bolshakov, and Maxim Shcherbakov, eds. Cyber-Physical Systems: Intelligent Models and Algorithms. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95116-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Prandini, Maria, and Ricardo G. Sanfelice, eds. Computation-Aware Algorithmic Design for Cyber-Physical Systems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43448-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cvetkov, Viktor. Basics of complexity theory. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.

Der volle Inhalt der Quelle
Annotation:
The monograph reveals the basics of complexity theory and methods for assessing complexity. The concept of complexity consideration is based on the analysis of complexity as a common attribute in processes and systems. The monograph describes the main methods for assessing different types of complexity. The concept of considering complexity in this monograph is also based on the fact that complexity is a comparative characteristic. It is given on a relative scale of difficulty. Therefore, complexity must be defined on a relative scale of “simplicity-complexity.” This concept motivates the cons
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Gupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Gupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Analog - A Cyber-Dystopian Noir Vol. 1: Death by Algorithm. Image Comics, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Avomo, Javier Clemente Engonga. Greed,decoding Amazon's Trading Algorithm: Cyber Revolution HOW to HACK AMAZON 2. Independently Published, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Cyber Algorithm"

1

Zhao, Xiaodong, Mengying Cao, Jingfang Su, Yijin Zhao, Shuying Liu, and Pingping Yu. "Path Planning Algorithm Based on A_star Algorithm and Q-Learning Algorithm." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wang, Yuanjie. "Macroeconomic Forecast Based on Neural Network Algorithm and Genetic Algorithm." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhou, Lu, and Yu Cui. "Electrical Control System Based on Machine Algorithm and Adaptive Fuzzy Algorithm." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_122.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Chen, Yikuan, Liang Li, and Wei Gao. "Domination Based Federated Learning Algorithm." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8_51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hong, Sung-Soo, and Sang-Kil Kim. "Mobile Animation Algorithm for Cyber Museum." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44864-0_61.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nguyen, Viet T., Alla G. Kravets, and Tu Q. H. Duong. "Predicting Research Trend Based on Bibliometric Analysis and Paper Ranking Algorithm." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhao, Ziyu, and Jintai Ding. "Practical Improvements on BKZ Algorithm." In Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Polyakov, Vladimir, Dmitriy Buhanov, Maxim Panchenko, Margarita Redkina, and Sergey Chernikov. "Research of the ELA Algorithm for Identifying Editing Fact in Jpeg Images." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_21.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Chen, Yun, Yunlan Du, and Xiaomei Cao. "Density Peak Clustering Algorithm Based on Differential Privacy Preserving." In Science of Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34637-9_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Wang, Caixin, Lili Wang, and Hongyong Yang. "Improved Kmeans Algorithm Based on Privacy Protection." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_42.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Cyber Algorithm"

1

Wang, Minghao, and Shaoyi Du. "OCDE: Adaptive Differential Evolution Algorithm in Distributed Intelligent Systems." In 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2024. https://doi.org/10.1109/cyberc62439.2024.00013.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Fisher, Ashwin, Rusty Baldwin, James T. Graham, and Ronald Riley. "Block-level algorithm classification based on RF side-channel." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2303847.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chang, Jian, Bin Li, Guowei Zhang, Zhida Liang, and Cong Wang. "The Control Algorithm of 7 DOF Manipulator Based on Hybrid Force and Position Algorithm." In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446183.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mohialden, Yasmin Makki, Saba Abdulbaqi Salman, Nadia Mahmood Hussien, and Younus Abdul Kareem Mohammed. "Multi-algorithm approach for arabic CAPTCHA generation." In CYBER DEFENSE IRAQ: CDI2024. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0234034.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Riley, Ronald A., James T. Graham, Ashwin Fisher, Rusty O. Baldwin, and Ryan M. Fuller. "Generalization of algorithm recognition in RF side channels between devices." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2304468.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Belaidi, Abderrahmane, and Hadjira Belaidi. "Optimization algorithm of manipulator robot performances." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917459.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dong, Huailin, Mingyuan He, and Ming Qiu. "Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm." In 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2015. http://dx.doi.org/10.1109/cyberc.2015.15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zexi, Deng, and Huang Feidan. "Cuckoo search algorithm for solving numerical integration." In 2015 IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2015. http://dx.doi.org/10.1109/cyber.2015.7288168.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Liwei, Wang, and Yin Ming. "A novel quadratic optimization control MPPT algorithm." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6319986.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Shuang, Yuan, and Lv Ci-xing. "Fast adaboost algorithm based on weight constraints." In 2015 IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2015. http://dx.doi.org/10.1109/cyber.2015.7288050.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Cyber Algorithm"

1

Guo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.

Der volle Inhalt der Quelle
Annotation:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Multi-sensor fusion (MSF) is believed to be a promising tool for vehicular localization in urban environments. Due to the differences in principles and performance of various onboard vehicle sensors, MSF inevitably suffers from heterogeneous sources and vulnerability to cyber-attacks. Therefore, an essential requirement of MSF is the capability of providing a consumer-grade solution that operates in real-time, is accurate, and immune to abnormal conditions with guaranteed performance and quality of service for location-b
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Der volle Inhalt der Quelle
Annotation:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

In Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/infographic.000003.

Der volle Inhalt der Quelle
Annotation:
rsecurity into the current practices of the public water infrastructure sector? ASCE collection on cybersecurity in water distribution networks Overview of smart water networks, their advantages and weaknesses, and growing challenges in securing resilience Lessons learned from past cybersecurity incidents AI-based algorithms for detecting and localizing cyber attacks Integrating cyber attacks into resilience and risk assessment procedures and emergency response measures Analyzing different types of cyber-physical attacks and their effects Modeling and simulation methodologies for managing wate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!