Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Jeffrey S Chavis"'
Architecting an Enterprise-of-Enterprises with the 10-Layer Rubric: Transforming EoE Decision-Making
Publikováno v:
2023 IEEE International Systems Conference (SysCon).
Publikováno v:
Information, Vol 10, Iss 4, p 122 (2019)
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neu
Externí odkaz:
https://doaj.org/article/3be58bc54be94119ad041eb5784368c5
Autor:
Jeffrey S. Chavis, Malcom Doster, Michelle Feng, Syeda Zeeshan, Samantha Fu, Elizabeth Aguirre, Antonio Davila, Kofi Nyarko, Aaron Kunz, Tracy Herriotts, Daniel Syed, Lanier Watkins, Anna Buczak, Aviel Rubin
Publikováno v:
2021 IEEE Integrated STEM Education Conference (ISEC).
Autor:
Malcolm K Doster, Jeffrey S Chavis
Publikováno v:
2021 IEEE Integrated STEM Education Conference (ISEC).
Autor:
Michelle S Feng, Jeffrey S Chavis
Publikováno v:
2021 IEEE Integrated STEM Education Conference (ISEC).
Autor:
Syeda J Zeeshan, Jeffrey S Chavis
Publikováno v:
2021 IEEE Integrated STEM Education Conference (ISEC).
Publikováno v:
IDSTA
Today our world benefits from Internet of Things (IoT) technology; however, new security problems arise when these IoT devices are introduced into our homes. Because many of these IoT devices have access to the Internet and they have little to no sec
Publikováno v:
SP Workshops
Complex systems of IoT devices (SIoTD) are systems that have a single purpose but are made up of multiple IoT devices. These systems are becoming ubiquitous, have complex security requirements, and face a diverse and ever-changing array of cyber thre
Publikováno v:
CCWC
The Internet of Things (IoT) will dramatically transform the home experience, but it presents significant security risks. We propose a system that helps reduce the cognitive load on a user in keeping their smart home network protected. The system hel
Publikováno v:
Information, Vol 10, Iss 4, p 122 (2019)
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neu