Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Poornima Panduranga Kundapur"'
Publikováno v:
IEEE Access, Vol 9, Pp 19723-19742 (2021)
Network Intrusion Detection is one of the most researched topics in the field of computer security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the confidentiality, integrity and availability of computer resources. Ther
Externí odkaz:
https://doaj.org/article/5a5c397eeea245c6b07eca4c2c4dffe2
Publikováno v:
Translational Behavioral Medicine. 11:1507-1516
Free smartphone applications that aim to promote physical activity or reduce sedentary behavior at workplaces were questioned for its content such as technical features, behavior change techniques (BCT) and security concerns. To evaluate systematical
Publikováno v:
IEEE Access, Vol 9, Pp 19723-19742 (2021)
Network Intrusion Detection is one of the most researched topics in the field of computer security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the confidentiality, integrity and availability of computer resources. Ther
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
The problem of network intrusion detection poses innumerable challenges to the research community, industry, and commercial sectors. Moreover, the persistent attacks occurring on the cyber-threat landscape compel researchers to devise robust approach
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811510809
Feature relevance is often investigated in classification problems to determine the contribution of each feature especially when a dataset comprises of numerous features. Feature selection or variable selection aids in creating an accurate predictive
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1796ca90565434282bb4c2cd34fa25a4
https://doi.org/10.1007/978-981-15-1081-6_27
https://doi.org/10.1007/978-981-15-1081-6_27
Publikováno v:
2019 International Conference on Advances in Computing, Communication and Control (ICAC3).
One of the most common academic processes that institutions/universities follow is that of maintaining student/staff attendance. However, it has been observed that the conventional method of taking students attendance on registers to confirm their ph
Autor:
Hemaraja Nayaka.S, Hitav Someshwar, Manikandan Natarajan, Shailesh Gardas, Volodymyr Golyk, Carl Froilan De Guzman Leochico, PTRP, MD, DPBRM, FPARM, Diana Carolina Cárdenas Poveda, Sivakumar Ramachandran, Poornima Panduranga Kundapur, Alejandra Rizo Arévalo, Nolly Nataly Castañeda-Ibáñez
Publikováno v:
Neurorehabilitation and Neural Repair. 32:363-538
Publikováno v:
Journal of Computer Science. 13:199-210
Pair programming is one of the widely used practices of Extreme Programming (XP). XP is a software development process which intends to enhance quality of software code in order to cater to the ever increasing demands of customers looking for IT solu
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811335990
Open Web Applications Security Project (OWASP), an open-source community committed to serve application developers and security professionals has always accentuated on the dire consequences of web application vulnerabilities like SQLI, XSS, LDAP, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76509040f555923c6c98d940a7e0566d
https://doi.org/10.1007/978-981-13-3600-3_12
https://doi.org/10.1007/978-981-13-3600-3_12