Author:
Lefebvre Michael,Nair Suku,Engels Daniel W.,Horne Dwight
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection;Future Internet;2024-09-10
2. Explaining Automatically Designed Software Defined Perimeters with a Two Phase Evolutionary Computation System;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2024-07-14
3. Quantum-Enhanced Zero Trust Security: Evolution, Implementation, and Application;2024 International Conference on Quantum Communications, Networking, and Computing (QCNC);2024-07-01
4. The Novel use of AI and ML System Integration in Developing Spruce Metropolis;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14
5. A Grading of PDN Based CC Networks;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14