Related references
Note: Only part of the references are listed.An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications
Romany F. Mansour et al.
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING (2019)
AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks
Jiaqi Li et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A New Optimization Algorithm Based on Search and Rescue Operations
Amir Shabani et al.
MATHEMATICAL PROBLEMS IN ENGINEERING (2019)
Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow
Youcef Djenouri et al.
IEEE ACCESS (2019)
Design of robust fuzzy fault detection filter for polynomial fuzzy systems with new finite frequency specifications
Ali Chibani et al.
AUTOMATICA (2018)
Distributed attack detection scheme using deep learning approach for Internet of Things
Abebe Abeshu Diro et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems
Amit Kleinmann et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2017)
Stacked Autoencoder-based deep learning for remote-sensing image classification: a case study of African land-cover mapping
Weijia Li et al.
INTERNATIONAL JOURNAL OF REMOTE SENSING (2016)