Artículos de revistas sobre el tema "Secure classification"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secure classification".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Pearson, Jane L., Deborah A. Cohn, Philip A. Cowan y Carolyn Pape Cowan. "Earned- and continuous-security in adult attachment: Relation to depressive symptomatology and parenting style". Development and Psychopathology 6, n.º 2 (1994): 359–73. http://dx.doi.org/10.1017/s0954579400004636.
Texto completoHareesha, K. S. y M. Sumana. "Secure Two Party Privacy Preserving Classification Using Encryption". International Journal of Information and Electronics Engineering 6, n.º 2 (2016): 67–71. http://dx.doi.org/10.18178/ijiee.2016.6.2.597.
Texto completoBaars, Thijs y Marco Spruit. "Designing a Secure Cloud Architecture". International Journal of Information Security and Privacy 6, n.º 1 (enero de 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Texto completoT., Tamanna y Rajeev Kumar. "Secure Cloud Model using Classification and Cryptography". International Journal of Computer Applications 159, n.º 6 (15 de febrero de 2017): 8–13. http://dx.doi.org/10.5120/ijca2017912953.
Texto completoUsharani, A. V. y Girija Attigeri. "Secure EMR Classification and Deduplication Using MapReduce". IEEE Access 10 (2022): 34404–14. http://dx.doi.org/10.1109/access.2022.3161439.
Texto completoWiseman, Simon R. "Classification services in the SWORD secure DBMS". Computers & Security 14, n.º 4 (enero de 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.
Texto completoSalehi, Mahmood y Azzedine Boukerche. "Secure opportunistic routing protocols: methods, models, and classification". Wireless Networks 25, n.º 2 (11 de septiembre de 2017): 559–71. http://dx.doi.org/10.1007/s11276-017-1575-1.
Texto completo., S. Narayanan. "CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING". International Journal of Research in Engineering and Technology 05, n.º 03 (25 de marzo de 2016): 159–66. http://dx.doi.org/10.15623/ijret.2016.0503034.
Texto completoS L Swapna y V Saravanan. "Jaccard Index Cat Gradient Boosting Classification for Secured Big Data Communication". Applied Science and Engineering Journal for Advanced Research 1, n.º 5 (30 de septiembre de 2022): 1–14. http://dx.doi.org/10.54741/asejar.1.5.1.
Texto completoB, Murugeshwari, Jayakumar C y Sarukesi K. "Secure Multi Party Computation Technique for Classification Rule Sharing". International Journal of Computer Applications 55, n.º 7 (20 de octubre de 2012): 1–10. http://dx.doi.org/10.5120/8764-2683.
Texto completoKatarahweire, Marriette, Engineer Bainomugisha y Khalid A. Mughal. "Data Classification for Secure Mobile Health Data Collection Systems". Development Engineering 5 (2020): 100054. http://dx.doi.org/10.1016/j.deveng.2020.100054.
Texto completoAhmed, Kazi Wasif, Omit Chanda, Noman Mohammed y Yang Wang. "Obfuscated image classification for secure image-centric friend recommendation". Sustainable Cities and Society 41 (agosto de 2018): 940–48. http://dx.doi.org/10.1016/j.scs.2017.10.001.
Texto completoTawalbeh, Lo’ai, Nour S. Darwazeh, Raad S. Al-Qassas y Fahd AlDosari. "A Secure Cloud Computing Model based on Data Classification". Procedia Computer Science 52 (2015): 1153–58. http://dx.doi.org/10.1016/j.procs.2015.05.150.
Texto completoBalachander, J. y E. Ramanujam. "Rule based Medical Content Classification for Secure Remote Health Monitoring". International Journal of Computer Applications 165, n.º 4 (17 de mayo de 2017): 21–26. http://dx.doi.org/10.5120/ijca2017913852.
Texto completoXue, Liang, Dongxiao Liu, Cheng Huang, Xiaodong Lin y Xuemin Sherman Shen. "Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity". Journal of Communications and Information Networks 5, n.º 1 (marzo de 2020): 16–25. http://dx.doi.org/10.23919/jcin.2020.9055107.
Texto completoLiu, Jiasen, Chao Wang, Zheng Tu, Xu An Wang, Chuan Lin y Zhihu Li. "Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace". Security and Communication Networks 2021 (3 de noviembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/8759922.
Texto completoResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento y Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation". IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Texto completoTangod, Kiran y Gururaj Kulkarni. "Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification". Journal of Intelligent Systems 29, n.º 1 (29 de junio de 2018): 703–18. http://dx.doi.org/10.1515/jisys-2017-0353.
Texto completoSamanthula, Bharath K., Yousef Elmehdwi y Wei Jiang. "k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data". IEEE Transactions on Knowledge and Data Engineering 27, n.º 5 (1 de mayo de 2015): 1261–73. http://dx.doi.org/10.1109/tkde.2014.2364027.
Texto completoUdhaya, P. y G. Manikandan. "An enhanced approach for secure pattern classification in adversarial environment". Contemporary Engineering Sciences 8 (2015): 533–38. http://dx.doi.org/10.12988/ces.2015.5269.
Texto completoZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu y Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Texto completoYoo, Yongjae, Jihwan Suh, Jeongyeup Paek y Saewoong Bahk. "Secure Region Detection Using Wi-Fi CSI and One-Class Classification". IEEE Access 9 (2021): 65906–13. http://dx.doi.org/10.1109/access.2021.3076176.
Texto completoS. Almasoud, Ahmed, Abdelzahir Abdelmaboud, Faisal S. Alsubaei, Manar Ahmed Hamza, Ishfaq Yaseen, Mohammed Abaker, Abdelwahed Motwakel y Mohammed Rizwanullah. "Deep Learning with Image Classification Based Secure CPS for Healthcare Sector". Computers, Materials & Continua 72, n.º 2 (2022): 2633–48. http://dx.doi.org/10.32604/cmc.2022.024619.
Texto completoIDRIS, ISMAILA, UMAR MAJIGI MUHAMMAD, MUHAMMAD ABDULHAMID SHAFI'I, OLALERE MORUFU, BASHIR ABDULLAHI MUHAMMAD y O. NWAOCHA VIVIAN. "SECURE UNIVERSITY NETWORK ARCHITECTURE, VULNERABILITIES, RISK PRIORITY LEVEL CLASSIFICATION AND COUNTERMEASURES". i-manager’s Journal on Wireless Communication Networks 7, n.º 2 (2018): 42. http://dx.doi.org/10.26634/jwcn.7.2.15604.
Texto completoYang, Haomiao, Shaopeng Liang, Jianbing Ni, Hongwei Li y Xuemin Sherman Shen. "Secure and Efficient k NN Classification for Industrial Internet of Things". IEEE Internet of Things Journal 7, n.º 11 (noviembre de 2020): 10945–54. http://dx.doi.org/10.1109/jiot.2020.2992349.
Texto completoLiu, Yi, Yu Luo, Youwen Zhu, Yang Liu y Xingxin Li. "Secure multi-label data classification in cloud by additionally homomorphic encryption". Information Sciences 468 (noviembre de 2018): 89–102. http://dx.doi.org/10.1016/j.ins.2018.07.054.
Texto completoDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang y Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification". Applied Sciences 12, n.º 24 (14 de diciembre de 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Texto completoKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao y G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication". E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Texto completoZuber, Martin y Renaud Sirdey. "Efficient homomorphic evaluation of k-NN classifiers". Proceedings on Privacy Enhancing Technologies 2021, n.º 2 (29 de enero de 2021): 111–29. http://dx.doi.org/10.2478/popets-2021-0020.
Texto completoSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón y Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue". Proceedings on Privacy Enhancing Technologies 2020, n.º 2 (1 de abril de 2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Texto completoTarik, Boudheb y Elberrichi Zakaria. "Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records". International Journal of Organizational and Collective Intelligence 8, n.º 3 (julio de 2018): 41–58. http://dx.doi.org/10.4018/ijoci.2018070104.
Texto completoKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani y Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction". Proceeding International Conference on Science and Engineering 3 (30 de abril de 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Texto completoSumana M. y Hareesha K.S. "Accurate Classification Models for Distributed Mining of Privately Preserved Data". International Journal of Information Security and Privacy 10, n.º 4 (octubre de 2016): 58–73. http://dx.doi.org/10.4018/ijisp.2016100104.
Texto completoAlrayes, Fatma S., Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen y Abdelwahed Motwakel. "Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems". Drones 6, n.º 9 (26 de agosto de 2022): 222. http://dx.doi.org/10.3390/drones6090222.
Texto completoAparna, R. y B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification". Journal of Computing and Information Technology 17, n.º 2 (2009): 203. http://dx.doi.org/10.2498/cit.1001215.
Texto completoTangod, Kiran y Gururaj Kulkarni. "Secure agent-based diagnosis and classification using optimal kernel support vector machine". International Journal of Biomedical Engineering and Technology 37, n.º 1 (2021): 25. http://dx.doi.org/10.1504/ijbet.2021.117513.
Texto completoKulkarni, Gururaj y Kiran Tangod. "Secure Agent Based Diagnosis and Classification Using Optimal Kernel Support Vector Machine". International Journal of Biomedical Engineering and Technology 1, n.º 1 (2018): 1. http://dx.doi.org/10.1504/ijbet.2018.10013947.
Texto completoPak, Wooguil. "Design of Integrated packet classification algorithm for Supporting High Performance Secure Routers". Journal of Security Engineering 15, n.º 2 (30 de abril de 2018): 103–18. http://dx.doi.org/10.14257/jse.2018.04.02.
Texto completoWu, Wei, Jian Liu, Hong Rong, Huimei Wang y Ming Xian. "Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database". IEEE Access 6 (2018): 41771–84. http://dx.doi.org/10.1109/access.2018.2859758.
Texto completoKaur, Kulwinder y Vikas Zandu. "A Secure Data Classification Model in Cloud Computing Using Machine Learning Approach". International Journal of Grid and Distributed Computing 9, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijgdc.2016.9.8.02.
Texto completoJ., Swathy y Surya S.R. "Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data". International Journal of Computer Applications 133, n.º 8 (15 de enero de 2016): 1–4. http://dx.doi.org/10.5120/ijca2016907988.
Texto completoLiu, Lin, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng y Xiaofeng Wang. "Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data". IEEE Internet of Things Journal 6, n.º 6 (diciembre de 2019): 9841–52. http://dx.doi.org/10.1109/jiot.2019.2932444.
Texto completoSun, Maohua y Ruidi Yang. "An efficient secure k nearest neighbor classification protocol with high‐dimensional features". International Journal of Intelligent Systems 35, n.º 11 (30 de agosto de 2020): 1791–813. http://dx.doi.org/10.1002/int.22272.
Texto completoJararweh, Yaser, Mahmoud Al-Ayyoub, Lo’ai Tawalbeh, Ala’ Darabseh y Houbing Song. "Software-defined systems support for secure cloud computing based on data classification". Annals of Telecommunications 72, n.º 5-6 (8 de noviembre de 2016): 335–45. http://dx.doi.org/10.1007/s12243-016-0549-0.
Texto completoA. Alissa, Khalid, Mohammed Maray, Areej A. Malibari, Sana Alazwari, Hamed Alqahtani, Mohamed K. Nour, Marwa Obbaya, Mohamed A. Shamseldin y Mesfer Al Duhayyim. "Optimal Deep Learning Model Enabled Secure UAV Classification for營ndustry 4.0". Computers, Materials & Continua 74, n.º 3 (2023): 5349–67. http://dx.doi.org/10.32604/cmc.2023.033532.
Texto completoLokhande, Meghana P., Dipti Durgesh Patil, Lalit V. Patil y Mohammad Shabaz. "Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery". Security and Communication Networks 2021 (27 de agosto de 2021): 1–16. http://dx.doi.org/10.1155/2021/5287514.
Texto completoArkhipova, Anastasiya y Danila Karevskiy. "Honeypot as a tool for creating an effective secure system". Digital Technology Security, n.º 2 (25 de junio de 2021): 122–35. http://dx.doi.org/10.17212/2782-2230-2021-2-122-135.
Texto completoRiggio, Giacomo, Angelo Gazzano, Borbála Zsilák, Beatrice Carlone y Chiara Mariti. "Quantitative Behavioral Analysis and Qualitative Classification of Attachment Styles in Domestic Dogs: Are Dogs with a Secure and an Insecure-Avoidant Attachment Different?" Animals 11, n.º 1 (23 de diciembre de 2020): 14. http://dx.doi.org/10.3390/ani11010014.
Texto completoKumar, Abhinav, Sanjay Kumar Singh, K. Lakshmanan, Sonal Saxena y Sameer Shrivastava. "A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images". ACM Transactions on Internet Technology 21, n.º 2 (junio de 2021): 1–22. http://dx.doi.org/10.1145/3424221.
Texto completoGongada, Sandhya Rani, Muktevi Chakravarthy y Bhukya Mangu. "Power system contingency classification using machine learning technique". Bulletin of Electrical Engineering and Informatics 11, n.º 6 (1 de diciembre de 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Texto completo