a Collaborative Anomaly Detection Framework (CADF) for detecting existing and new attacks that face Internet/Cloud of Things.
02 March 2017 242 2 View
Researching in Network forensics & Cloud Computing
07 August 2014 5,956 1 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
The Lanthanide contraction which is the decrease in ionic radii of the elements in the lanthanide series from atomic number 57, lanthanum, to 71, lutetium, is due to poor shielding of the 4f...
01 March 2021 2,272 4 View
We have synthesized various metal complexes with different environment around the metals. Now to see the application of synthesized complexes we need this study also. we are also interested in...
01 March 2021 1,899 2 View
I am working on developing a micromechanical FE model for predicting kink-band formation in UD composites. To model matrix plasticity, which model, out of Concrete Damaged Plasticity and...
28 February 2021 5,415 1 View
I am working on TiO2 composite material and the results of XRD have a lot of small/junk peaks and while I apply a smooth filter in Origin then the other characteristics peaks disappear so anyone...
26 February 2021 8,183 3 View
Warm greetings My name is Ayichew S. and I am doing my Ph.D. in Medical Microbiology (on Human papillomavirus). At this stage, I have almost completed a clinical sample Cervical swabs)...
25 February 2021 1,660 3 View
Hi, everyone I'm working on a privacy-preserving algorithm that will apply to IoT devices. So, I need to measure the power consumption by implementing this algorithm. Any suggestion, advice,...
25 February 2021 8,749 6 View
Im looking for any papers, reports,articles, links etc on information on How vulnerable is water and wastewater infrastructure to cyber terrorism in an age of IoT.
24 February 2021 2,750 4 View
Most of the papers have compared different hyperparameters such as layers, initializers, activation function, and optimizer algorithm in the CNN algorithm for detecting network intrusion. This is...
24 February 2021 4,578 4 View
My real system (buck converter) can only take an input of 0 to 1 (duty ratio) and I need to constrain the system so the controller action keeps within this bounds. How can I do this? The code for...
22 February 2021 2,125 3 View