![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- European Conference on Machine Learning and Knowledge Discovery in Databases (PKDD)
- International Conference on Cyber Security Cryptography and Machine Learning (CSCML)
- International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT)
- International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (MIND)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 658 matches
- 2024
- Madala Guru Brahmam
, R. Vijay Anand
:
VMMISD: An Efficient Load Balancing Model for Virtual Machine Migrations via Fused Metaheuristics With Iterative Security Measures and Deep Learning Optimizations. IEEE Access 12: 39351-39374 (2024) - Panagiotis K. Gkonis
, Nikolaos Nomikos
, Panagiotis Trakadas
, Lambros Sarakis, George Xylouris
, Xavi Masip-Bruin, Josep Martrat:
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks. IEEE Access 12: 21320-21336 (2024) - Merve Ozkan-Okay
, Erdal Akin
, Ömer Aslan
, Selahattin Kosunalp
, Teodor B. Iliev
, Ivaylo S. Stoyanov
, Ivan H. Beloev
:
A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions. IEEE Access 12: 12229-12256 (2024) - Pradyumna G. R.
, Roopa B. Hegde
, Bommegowda K. B.
, Tony Jan
, Ganesh R. Naik
:
Empowering Healthcare With IoMT: Evolution, Machine Learning Integration, Security, and Interoperability Challenges. IEEE Access 12: 20603-20623 (2024) - Muhammad Sulaiman
, Muhammad Waseem
, Addisu Negash Ali
, Ghaylen Laouini
, Fahad Sameer Alshammari
:
Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach. IEEE Access 12: 4958-4984 (2024) - Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet Ercan Topcu:
Research trends in deep learning and machine learning for cloud computing security. Artif. Intell. Rev. 57(5): 132 (2024) - Nasser O. Alshammari, Shumaila Shahzadi, Saad Awadh Alanazi, Shahid Naseem, Muhammad Anwar, Maddalah Alruwaili, Muhammad Rizwan Abid, Omar Alruwali, Ahmed Alsayat, Fahad Ahmad
:
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques. Comput. Syst. Sci. Eng. 48(2): 363-394 (2024) - Huaming Chen
, Muhammad Ali Babar
:
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. ACM Comput. Surv. 56(6): 151:1-151:38 (2024) - Yazan Otoum
, Navya Gottimukkala
, Neeraj Kumar
, Amiya Nayak
:
Machine Learning in Metaverse Security: Current Solutions and Future Challenges. ACM Comput. Surv. 56(8): 215:1-215:36 (2024) - Hamed Alqahtani, Gulshan Kumar:
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems. Eng. Appl. Artif. Intell. 129: 107667 (2024) - Anum Paracha, Junaid Arshad, Mohamed Ben Farah, Khalid Ismail:
Machine learning security and privacy: a review of threats and countermeasures. EURASIP J. Inf. Secur. 2024(1): 10 (2024) - Kenan Ince
:
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT. Int. J. Inf. Sec. 23(2): 1117-1130 (2024) - Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi:
Trustworthy machine learning in the context of security and privacy. Int. J. Inf. Sec. 23(3): 2287-2314 (2024) - Alejandro Valencia-Arias
, Juan David Gonzalez-Ruiz
, Lilian Verde Flores, Luis Vega-Mori
, Paula Andrea Rodríguez-Correa
, Gustavo Sánchez Santos:
Machine Learning and Blockchain: A Bibliometric Study on Security and Privacy. Inf. 15(1): 65 (2024) - Birendra Kumar Verma, Ajay Kumar Yadav:
Software security with natural language processing and vulnerability scoring using machine learning approach. J. Ambient Intell. Humaniz. Comput. 15(4): 2641-2651 (2024) - Chunchun Ni, Shancang Li
:
Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions. J. Ind. Inf. Integr. 38: 100549 (2024) - Ahsan Nazir
, Jingsha He
, Nafei Zhu
, Ahsan Wajahat
, Faheem Ullah, Sirajuddin Qureshi
, Xiangjun Ma, Muhammad Salman Pathan
:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - Retraction notice to 'A machine learning based IoT for providing an intrusion detection system for security' [Microprocessors and Microsystems 82 (2021) 103741]. Microprocess. Microsystems 105: 105028 (2024)
- Jinghua Zhao:
Special Issue on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT2022). Neural Comput. Appl. 36(5): 2119-2120 (2024) - Kaiyi Long:
A Study of Blockchain and Machine Learning-Enabled IoT Security in Time-Delayed Neural Network Vocal Pattern Recognition to Improve Web-Based Vocal Teaching. Scalable Comput. Pract. Exp. 25(2): 812-823 (2024) - Easa Alalwany
, Imad Mahgoub
:
Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors 24(2): 368 (2024) - Xiao Cai
, Kaibo Shi, Yanbin Sun, Jinde Cao
, Shiping Wen
, Cheng Qiao
, Zhihong Tian
:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. IEEE Trans. Inf. Forensics Secur. 19: 3857-3865 (2024) - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. J. Supercomput. 80(3): 3738-3816 (2024) - C. Tamizshelvan, V. Vijayalakshmi:
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures. Wirel. Networks 30(4): 2099-2114 (2024) - Saikat Das, Bhargavi Krishnamurthy, Raktim Ranjan Das, Sajjan G. Shiva:
State of the art: Security Testing of Machine Learning Development Systems. CCWC 2024: 534-540 - Anoop Singhal
:
Modeling and Security Analysis of Attacks on Machine Learning Systems. IWSPA@CODASPY 2024: 1-2 - Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Viktoriia Zhebka:
Intrusion Detection based on an Intelligent Security System using Machine Learning Methods. CPITS 2024: 163-178 - Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell:
Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security. GIIS 2024: 1-7 - Bulbul Ahmed
, M. Sazadur Rahman
, Kimia Zamiri Azar
, Farimah Farahmandi
, Fahim Rahman
, Mark M. Tehranipoor
:
SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented Estimation. ACM Great Lakes Symposium on VLSI 2024: 489-494 - Sara Boanca:
Exploring Patterns and Assessing the Security of Pseudorandom Number Generators with Machine Learning. ICAART (3) 2024: 186-193
skipping 628 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-24 14:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint