Zobrazeno 1 - 10
of 54
pro vyhledávání: '"M., Satheesh Kumar"'
Publikováno v:
Energy Reports, Vol 7, Iss , Pp 7925-7939 (2021)
With the prevalence of Aerospace Technologies, the regulations of cybersecurity are becoming smarter, assured, and long-lasting. Modern communication network technologies have enormous growth in the cyber threats and masquerading attacks to steal dat
Externí odkaz:
https://doaj.org/article/0ec89f50f0af48fa86a09f83cd28ab49
Publikováno v:
Journal of Cardiovascular Disease Research (Journal of Cardiovascular Disease Research); 2023, Vol. 14 Issue 12, p1885-1891, 7p
Publikováno v:
Asian Dyer; Dec2023/Jan2024, Vol. 20 Issue 6, p40-43, 4p
Publikováno v:
Communications in Computer and Information Science ISBN: 9783031276217
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e8e422123e40c0b042b26490b14fee84
https://doi.org/10.1007/978-3-031-27622-4_27
https://doi.org/10.1007/978-3-031-27622-4_27
Publikováno v:
Energy Reports, Vol 7, Iss, Pp 7925-7939 (2021)
With the prevalence of Aerospace Technologies, the regulations of cybersecurity are becoming smarter, assured, and long-lasting. Modern communication network technologies have enormous growth in the cyber threats and masquerading attacks to steal dat
Autor:
S. Lakshmi Narayanan, S. Shunmugavel, R. Prasanth, M. Satheesh Kumar, K. Srujan Raju, K. Suthendran
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811919756
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b3bf7119fef2a2b6b440f4251ca0973
https://doi.org/10.1007/978-981-19-1976-3_22
https://doi.org/10.1007/978-981-19-1976-3_22
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:1331-1335
In this paper, some potentially unwanted program (PUP) samples are analyzed, detected and are blocked using YARA rules. Nowadays the user may notices the unwanted software such as PUP or a potentially unwanted application (PUA) . For security and par
Publikováno v:
Privacy and Security Challenges in Cloud Computing ISBN: 9781003219880
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c8c7d01c505fe9d0d0d2a2a213625a6
https://doi.org/10.1201/9781003219880-11
https://doi.org/10.1201/9781003219880-11
Publikováno v:
Privacy and Security Challenges in Cloud Computing ISBN: 9781003219880
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1381eb852b0928f25344e6e7346d9cab
https://doi.org/10.1201/9781003219880-9
https://doi.org/10.1201/9781003219880-9