Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Nikolaos Polatidis"'
Publikováno v:
Applied Artificial Intelligence, Vol 37, Iss 1 (2023)
Automated decision-making techniques play a crucial role in data science, AI, and general machine learning. However, such techniques need to balance accuracy with computational complexity, as their solution requirements are likely to need exhaustive
Externí odkaz:
https://doaj.org/article/8f8f82e90cfa4ffb84f4e1972431c134
Publikováno v:
Journal of Information and Telecommunication, Vol 4, Iss 3, Pp 346-362 (2020)
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods. Consideri
Externí odkaz:
https://doaj.org/article/76b8f8a81a2f4514976c37fc191507d4
Autor:
Gharbi Alshammari, Stelios Kapetanakis, Abdullah Alshammari, Nikolaos Polatidis, Miltos Petridis
Publikováno v:
Vietnam Journal of Computer Science, Vol 6, Iss 3, Pp 363-376 (2019)
Recommender systems help users find relevant items efficiently based on their interests and historical interactions with other users. They are beneficial to businesses by promoting the sale of products and to user by reducing the search burden. Recom
Externí odkaz:
https://doaj.org/article/d01afc58534f499795c254e8c9d6b7df
Publikováno v:
Neural Computing and Applications. 34:15165-15174
Publikováno v:
Expert Systems with Applications. 218:119606
When it comes to protecting our privacy, most Virtual Private Networks (VPNs) fail. Many of the popular VPNs are not safe to use specially if we are using a VPN to protect our privacy online. VPNs can look perfect on the surface, yet still be an abso
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19b0aa062f61d9317893ab717e542063
https://doi.org/10.21203/rs.3.rs-1604537/v1
https://doi.org/10.21203/rs.3.rs-1604537/v1
Publikováno v:
Digital; Volume 2; Issue 1; Pages: 65-87
Blockchain is now utilized by a diverse spectrum of applications and is proclaimed as a technological innovation that transforms the way that data are stored. This technology has the potential to transform the healthcare sector, especially the preval
Publikováno v:
Journal of Information and Telecommunication, Vol 4, Iss 3, Pp 346-362 (2020)
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods. Consideri
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031159183
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::06b494bbf356121658c7ee9886113dce
https://doi.org/10.1007/978-3-031-15919-0_38
https://doi.org/10.1007/978-3-031-15919-0_38
Publikováno v:
Engineering Applications of Neural Networks ISBN: 9783031082221
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bd03387980985b3cf4785801397d1335
https://doi.org/10.1007/978-3-031-08223-8_17
https://doi.org/10.1007/978-3-031-08223-8_17