Open Access
ARTICLE
Chirag Ganguli1, Shishir Kumar Shandilya2, Michal Gregus3, Oleh Basystiuk4,*
1 Institute of Technology, VIT Bhopal University, Bhopal, India
2 School of Data Science and Forecasting, Devi Ahilya University, Indore, 452001, India
3 Department of Information Systems, Comenius University in Bratislava, Bratislava, 82005, Slovak Republic
4 Department of Artificial Intelligence, Lviv Polytechnic National University, Lviv, 79013, Ukraine
* Corresponding Author: Oleh Basystiuk. Email: ,
Computer Systems Science and Engineering https://doi.org/10.32604/csse.2024.042607
Received 05 June 2023; Accepted 27 December 2023; Published online 25 March 2024
View
Download
Like
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
Weidong Fang, Wuxiong Zhang, QianQian...A Convolution-Based System for Malicious URLs Detection
Chaochao Luo, Shen Su, Yanbin...Data Security Defense and Algorithm for Edge Computing Based on Mean Field Game
Chengshan Qian, Xue Li, Ning Sun,...Cyber-security Risk Assessment Framework for Critical Infrastructures
Zubair Baig, Sherali ZeadallyHigh Visual Quality Image Steganography Based on Encoder-Decoder Model
Yan Wang, Zhangjie Fu, Xingming...