Author:
Shannaq Boumedyen,Talab Mohammed Ahmed,Shakir Mohanaad,Sheker Mustefa Talal,Farhan Ahmed Mohsin
Reference22 articles.
1. Kareem, A. A., Hammood, D. A., Alchalaby, A. A., & Khamees, R. A. (2022). A Performance of Low-Cost NVIDIA Jetson Nano Embedded System in the Real-Time Siamese Single Object Tracking: A Comparison Study. In International Conference on Computing Science, Communication and Security (pp. 296–310). Springer, Cham.
2. A survey of emerging threats in cybersecurity
3. Jebur, R. S., Der, C. S., & Hammood, D. A. (2020, December). A Review and Taxonomy of Image Denoising Techniques. In 2020 6th International Conference on Interactive Digital Media (ICIDM) (pp. 1–6). IEEE.
4. Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning
5. Kelly R.F. (2017). the insider threat to cybersecurity: how group process and ignorance affect analyst accuracy and promptitude. Naval postgraduate school Monterey, California dissertation, https://calhoun.nps.edu/handle/10945/56145
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献