From post

Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle.

, , , , и . IEA/AIE, том 13343 из Lecture Notes in Computer Science, стр. 505-515. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient and Accurate Text Localization Algorithm in Compressed Mobile Phone Image Domain., , , , , , и . IPCV, стр. 610-614. CSREA Press, (2010)Design and Development Assessment., , , , , и . IWSSD, стр. 105-114. IEEE Computer Society, (2000)Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle., , , , и . IEA/AIE, том 13343 из Lecture Notes in Computer Science, стр. 505-515. Springer, (2022)Reducing Software Security Risk through an Integrated Approach., , и . WETICE, стр. 141-146. IEEE Computer Society, (2000)FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT., , , , и . IEEE Access, (2024)Creating an institutional repository at a challenged institution.. OCLC Syst. Serv., 23 (2): 142-147 (2007)Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection., , , , , и . GECCO (Companion), стр. 1521-1522. ACM, (2012)A Survey of QEMU-Based Fault Injection Tools & Techniques for Emulating Physical Faults., , и . IEEE Access, (2023)A comparison of GEC-based feature selection and weighting for multimodal biometric recognition., , , , , , , , , и . IEEE Congress on Evolutionary Computation, стр. 2725-2728. IEEE, (2011)Comparing Object-Oriented and Data Flow Models - a Case Study., и . ACM Conference on Computer Science, стр. 541-547. ACM, (1992)