Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Arthur A. M. Teodoro"'
Autor:
Robson V. Mendonca, Arthur A. M. Teodoro, Renata L. Rosa, Muhammad Saadi, Dick Carrillo Melgarejo, Pedro H. J. Nardelli, Demostenes Z. Rodriguez
Publikováno v:
IEEE Access, Vol 9, Pp 61024-61034 (2021)
Currently, with the increasing number of devices connected to the Internet, search for network vulnerabilities to attackers has increased, and protection systems have become indispensable. There are prevalent security attacks, such as the Distributed
Externí odkaz:
https://doaj.org/article/27435b6fa15045c1a516c66d26e484e3
Autor:
Arthur A. M. Teodoro, Douglas H. Silva, Renata L. Rosa, Muhammad Saadi, Lunchakorn Wuttisittikulkij, Rao Asad Mumtaz, Demóstenes Z. Rodríguez
Publikováno v:
Journal of Signal Processing Systems. 95:211-224
Autor:
Renata Lopes Rosa, Sattam Al Otaibi, Muhammad Saadi, Demostenes Zegarra Rodriguez, Ogobuchi D. Okey, Arthur A. M. Teodoro, Douglas Henrique Silva
Publikováno v:
Journal of Signal Processing Systems
The SARS-CoV-2 virus causes a respiratory disease in humans, known as COVID-19. The confirmatory diagnostic of this disease occurs through the real-time reverse transcription and polymerase chain reaction test (RT-qPCR). However, the period of obtain
Autor:
Demostenes Zegarra Rodriguez, Arthur A. M. Teodoro, Muhammad Saadi, Otavio de Souza Martins Gomes, Bruno A. Silva, Renata Lopes Rosa
Publikováno v:
Wireless Personal Communications. 127:1085-1116
Nowadays, the high number of devices and applications connected to the Internet has generated a great amount of data being which makes privacy and protection a more challenging task. In addition, new technologies, such as the Internet of Things, inco
Autor:
Pedro H. J. Nardelli, Dick Carrillo Melgarejo, Robson V. Mendonca, Demostenes Zegarra Rodriguez, Muhammad Saadi, Arthur A. M. Teodoro, Renata Lopes Rosa
Publikováno v:
IEEE Access, Vol 9, Pp 61024-61034 (2021)
Currently, with the increasing number of devices connected to the Internet, search for network vulnerabilities to attackers has increased, and protection systems have become indispensable. There are prevalent security attacks, such as the Distributed