Immune Algorithms applied to Intrusion Detection with Keystroke Dynamics
Features selection using a metaheuristic approach for anomaly detection in compute...
Autonomous network management model through adaptive data flow analysis (front: fo...
Power-performance optimization in hybrid reconfigurable multicore architectures
Enhancing the privacy and security of IoT intrusion detection systems through fede...
Acceleration of Kalman filter applications with heterogeneous computing