Showing 1 - 20 results of 1,588 for search '"attacks"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A Backdoor Approach With Inverted Labels Using Dirty Label-Flipping Attacks by Orson Mengara

    Published 2025-01-01
    Subjects: “…Poisoning attacks…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
    Get full text
    Article
  20. 20

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
    Get full text
    Article