Partial undersampling of imbalanced data for cyber threats detection
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
Development of a risk-based maintenance (RBM) strategy for sewerage pumping station network
Generating linked data repositories using UML artifacts
Measuring soil strain using fibre optic sensors
Multi-source cyber-attacks detection using machine learning
Are you sure you would like to clear your session, including search history and login status?