Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Dong-Young Yoo"'
Autor:
Young-Woo Hong, Dong-Young Yoo
Publikováno v:
Applied Sciences, Vol 14, Iss 13, p 5487 (2024)
Recently, methods to detect DoS and spoofing attacks on In-Vehicle Networks via the CAN protocol have been studied using deep learning models, such as CNN, RNN, and LSTM. These studies have produced significant results in the field of In-Vehicle Netw
Externí odkaz:
https://doaj.org/article/3fa7607050314b9e8ae8283aa845b3aa
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 26:551-558
Publikováno v:
Journal of the Korea society of IT services. 10:293-308
The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when se
Publikováno v:
Journal of Intelligent & Robotic Systems. 63:131-147
We present an algorithm to model 3D workspace and to understand test scene for mobile robot's navigation or human computer interaction. This has done by line-based modeling and recognition algorithm. Line-based recognition using 3D lines has been tri
Publikováno v:
2010 2nd International Conference on Software Engineering & Data Mining (SEDM); 2010, p192-196, 5p
Publikováno v:
2008 International Conference on Security Technology; 2008, p142-145, 4p
Publikováno v:
Journal of Intelligent & Robotic Systems; Jul2011, Vol. 63 Issue 1, p131-147, 17p, 4 Color Photographs, 5 Diagrams, 5 Graphs