Artigos de revistas sobre o tema "Secure classification"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Secure classification".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Pearson, Jane L., Deborah A. Cohn, Philip A. Cowan e Carolyn Pape Cowan. "Earned- and continuous-security in adult attachment: Relation to depressive symptomatology and parenting style". Development and Psychopathology 6, n.º 2 (1994): 359–73. http://dx.doi.org/10.1017/s0954579400004636.
Texto completo da fonteHareesha, K. S., e M. Sumana. "Secure Two Party Privacy Preserving Classification Using Encryption". International Journal of Information and Electronics Engineering 6, n.º 2 (2016): 67–71. http://dx.doi.org/10.18178/ijiee.2016.6.2.597.
Texto completo da fonteBaars, Thijs, e Marco Spruit. "Designing a Secure Cloud Architecture". International Journal of Information Security and Privacy 6, n.º 1 (janeiro de 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Texto completo da fonteT., Tamanna, e Rajeev Kumar. "Secure Cloud Model using Classification and Cryptography". International Journal of Computer Applications 159, n.º 6 (15 de fevereiro de 2017): 8–13. http://dx.doi.org/10.5120/ijca2017912953.
Texto completo da fonteUsharani, A. V., e Girija Attigeri. "Secure EMR Classification and Deduplication Using MapReduce". IEEE Access 10 (2022): 34404–14. http://dx.doi.org/10.1109/access.2022.3161439.
Texto completo da fonteWiseman, Simon R. "Classification services in the SWORD secure DBMS". Computers & Security 14, n.º 4 (janeiro de 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.
Texto completo da fonteSalehi, Mahmood, e Azzedine Boukerche. "Secure opportunistic routing protocols: methods, models, and classification". Wireless Networks 25, n.º 2 (11 de setembro de 2017): 559–71. http://dx.doi.org/10.1007/s11276-017-1575-1.
Texto completo da fonte., S. Narayanan. "CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING". International Journal of Research in Engineering and Technology 05, n.º 03 (25 de março de 2016): 159–66. http://dx.doi.org/10.15623/ijret.2016.0503034.
Texto completo da fonteS L Swapna e V Saravanan. "Jaccard Index Cat Gradient Boosting Classification for Secured Big Data Communication". Applied Science and Engineering Journal for Advanced Research 1, n.º 5 (30 de setembro de 2022): 1–14. http://dx.doi.org/10.54741/asejar.1.5.1.
Texto completo da fonteB, Murugeshwari, Jayakumar C e Sarukesi K. "Secure Multi Party Computation Technique for Classification Rule Sharing". International Journal of Computer Applications 55, n.º 7 (20 de outubro de 2012): 1–10. http://dx.doi.org/10.5120/8764-2683.
Texto completo da fonteKatarahweire, Marriette, Engineer Bainomugisha e Khalid A. Mughal. "Data Classification for Secure Mobile Health Data Collection Systems". Development Engineering 5 (2020): 100054. http://dx.doi.org/10.1016/j.deveng.2020.100054.
Texto completo da fonteAhmed, Kazi Wasif, Omit Chanda, Noman Mohammed e Yang Wang. "Obfuscated image classification for secure image-centric friend recommendation". Sustainable Cities and Society 41 (agosto de 2018): 940–48. http://dx.doi.org/10.1016/j.scs.2017.10.001.
Texto completo da fonteTawalbeh, Lo’ai, Nour S. Darwazeh, Raad S. Al-Qassas e Fahd AlDosari. "A Secure Cloud Computing Model based on Data Classification". Procedia Computer Science 52 (2015): 1153–58. http://dx.doi.org/10.1016/j.procs.2015.05.150.
Texto completo da fonteBalachander, J., e E. Ramanujam. "Rule based Medical Content Classification for Secure Remote Health Monitoring". International Journal of Computer Applications 165, n.º 4 (17 de maio de 2017): 21–26. http://dx.doi.org/10.5120/ijca2017913852.
Texto completo da fonteXue, Liang, Dongxiao Liu, Cheng Huang, Xiaodong Lin e Xuemin Sherman Shen. "Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity". Journal of Communications and Information Networks 5, n.º 1 (março de 2020): 16–25. http://dx.doi.org/10.23919/jcin.2020.9055107.
Texto completo da fonteLiu, Jiasen, Chao Wang, Zheng Tu, Xu An Wang, Chuan Lin e Zhihu Li. "Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace". Security and Communication Networks 2021 (3 de novembro de 2021): 1–12. http://dx.doi.org/10.1155/2021/8759922.
Texto completo da fonteResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento e Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation". IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Texto completo da fonteTangod, Kiran, e Gururaj Kulkarni. "Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification". Journal of Intelligent Systems 29, n.º 1 (29 de junho de 2018): 703–18. http://dx.doi.org/10.1515/jisys-2017-0353.
Texto completo da fonteSamanthula, Bharath K., Yousef Elmehdwi e Wei Jiang. "k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data". IEEE Transactions on Knowledge and Data Engineering 27, n.º 5 (1 de maio de 2015): 1261–73. http://dx.doi.org/10.1109/tkde.2014.2364027.
Texto completo da fonteUdhaya, P., e G. Manikandan. "An enhanced approach for secure pattern classification in adversarial environment". Contemporary Engineering Sciences 8 (2015): 533–38. http://dx.doi.org/10.12988/ces.2015.5269.
Texto completo da fonteZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu e Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, n.º 06 (setembro de 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Texto completo da fonteYoo, Yongjae, Jihwan Suh, Jeongyeup Paek e Saewoong Bahk. "Secure Region Detection Using Wi-Fi CSI and One-Class Classification". IEEE Access 9 (2021): 65906–13. http://dx.doi.org/10.1109/access.2021.3076176.
Texto completo da fonteS. Almasoud, Ahmed, Abdelzahir Abdelmaboud, Faisal S. Alsubaei, Manar Ahmed Hamza, Ishfaq Yaseen, Mohammed Abaker, Abdelwahed Motwakel e Mohammed Rizwanullah. "Deep Learning with Image Classification Based Secure CPS for Healthcare Sector". Computers, Materials & Continua 72, n.º 2 (2022): 2633–48. http://dx.doi.org/10.32604/cmc.2022.024619.
Texto completo da fonteIDRIS, ISMAILA, UMAR MAJIGI MUHAMMAD, MUHAMMAD ABDULHAMID SHAFI'I, OLALERE MORUFU, BASHIR ABDULLAHI MUHAMMAD e O. NWAOCHA VIVIAN. "SECURE UNIVERSITY NETWORK ARCHITECTURE, VULNERABILITIES, RISK PRIORITY LEVEL CLASSIFICATION AND COUNTERMEASURES". i-manager’s Journal on Wireless Communication Networks 7, n.º 2 (2018): 42. http://dx.doi.org/10.26634/jwcn.7.2.15604.
Texto completo da fonteYang, Haomiao, Shaopeng Liang, Jianbing Ni, Hongwei Li e Xuemin Sherman Shen. "Secure and Efficient k NN Classification for Industrial Internet of Things". IEEE Internet of Things Journal 7, n.º 11 (novembro de 2020): 10945–54. http://dx.doi.org/10.1109/jiot.2020.2992349.
Texto completo da fonteLiu, Yi, Yu Luo, Youwen Zhu, Yang Liu e Xingxin Li. "Secure multi-label data classification in cloud by additionally homomorphic encryption". Information Sciences 468 (novembro de 2018): 89–102. http://dx.doi.org/10.1016/j.ins.2018.07.054.
Texto completo da fonteDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang e Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification". Applied Sciences 12, n.º 24 (14 de dezembro de 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Texto completo da fonteKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao e G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication". E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Texto completo da fonteZuber, Martin, e Renaud Sirdey. "Efficient homomorphic evaluation of k-NN classifiers". Proceedings on Privacy Enhancing Technologies 2021, n.º 2 (29 de janeiro de 2021): 111–29. http://dx.doi.org/10.2478/popets-2021-0020.
Texto completo da fonteSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón e Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue". Proceedings on Privacy Enhancing Technologies 2020, n.º 2 (1 de abril de 2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Texto completo da fonteTarik, Boudheb, e Elberrichi Zakaria. "Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records". International Journal of Organizational and Collective Intelligence 8, n.º 3 (julho de 2018): 41–58. http://dx.doi.org/10.4018/ijoci.2018070104.
Texto completo da fonteKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani e Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction". Proceeding International Conference on Science and Engineering 3 (30 de abril de 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Texto completo da fonteSumana M. e Hareesha K.S. "Accurate Classification Models for Distributed Mining of Privately Preserved Data". International Journal of Information Security and Privacy 10, n.º 4 (outubro de 2016): 58–73. http://dx.doi.org/10.4018/ijisp.2016100104.
Texto completo da fonteAlrayes, Fatma S., Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen e Abdelwahed Motwakel. "Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems". Drones 6, n.º 9 (26 de agosto de 2022): 222. http://dx.doi.org/10.3390/drones6090222.
Texto completo da fonteAparna, R., e B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification". Journal of Computing and Information Technology 17, n.º 2 (2009): 203. http://dx.doi.org/10.2498/cit.1001215.
Texto completo da fonteTangod, Kiran, e Gururaj Kulkarni. "Secure agent-based diagnosis and classification using optimal kernel support vector machine". International Journal of Biomedical Engineering and Technology 37, n.º 1 (2021): 25. http://dx.doi.org/10.1504/ijbet.2021.117513.
Texto completo da fonteKulkarni, Gururaj, e Kiran Tangod. "Secure Agent Based Diagnosis and Classification Using Optimal Kernel Support Vector Machine". International Journal of Biomedical Engineering and Technology 1, n.º 1 (2018): 1. http://dx.doi.org/10.1504/ijbet.2018.10013947.
Texto completo da fontePak, Wooguil. "Design of Integrated packet classification algorithm for Supporting High Performance Secure Routers". Journal of Security Engineering 15, n.º 2 (30 de abril de 2018): 103–18. http://dx.doi.org/10.14257/jse.2018.04.02.
Texto completo da fonteWu, Wei, Jian Liu, Hong Rong, Huimei Wang e Ming Xian. "Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database". IEEE Access 6 (2018): 41771–84. http://dx.doi.org/10.1109/access.2018.2859758.
Texto completo da fonteKaur, Kulwinder, e Vikas Zandu. "A Secure Data Classification Model in Cloud Computing Using Machine Learning Approach". International Journal of Grid and Distributed Computing 9, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijgdc.2016.9.8.02.
Texto completo da fonteJ., Swathy, e Surya S.R. "Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data". International Journal of Computer Applications 133, n.º 8 (15 de janeiro de 2016): 1–4. http://dx.doi.org/10.5120/ijca2016907988.
Texto completo da fonteLiu, Lin, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng e Xiaofeng Wang. "Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data". IEEE Internet of Things Journal 6, n.º 6 (dezembro de 2019): 9841–52. http://dx.doi.org/10.1109/jiot.2019.2932444.
Texto completo da fonteSun, Maohua, e Ruidi Yang. "An efficient secure k nearest neighbor classification protocol with high‐dimensional features". International Journal of Intelligent Systems 35, n.º 11 (30 de agosto de 2020): 1791–813. http://dx.doi.org/10.1002/int.22272.
Texto completo da fonteJararweh, Yaser, Mahmoud Al-Ayyoub, Lo’ai Tawalbeh, Ala’ Darabseh e Houbing Song. "Software-defined systems support for secure cloud computing based on data classification". Annals of Telecommunications 72, n.º 5-6 (8 de novembro de 2016): 335–45. http://dx.doi.org/10.1007/s12243-016-0549-0.
Texto completo da fonteA. Alissa, Khalid, Mohammed Maray, Areej A. Malibari, Sana Alazwari, Hamed Alqahtani, Mohamed K. Nour, Marwa Obbaya, Mohamed A. Shamseldin e Mesfer Al Duhayyim. "Optimal Deep Learning Model Enabled Secure UAV Classification for營ndustry 4.0". Computers, Materials & Continua 74, n.º 3 (2023): 5349–67. http://dx.doi.org/10.32604/cmc.2023.033532.
Texto completo da fonteLokhande, Meghana P., Dipti Durgesh Patil, Lalit V. Patil e Mohammad Shabaz. "Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery". Security and Communication Networks 2021 (27 de agosto de 2021): 1–16. http://dx.doi.org/10.1155/2021/5287514.
Texto completo da fonteArkhipova, Anastasiya, e Danila Karevskiy. "Honeypot as a tool for creating an effective secure system". Digital Technology Security, n.º 2 (25 de junho de 2021): 122–35. http://dx.doi.org/10.17212/2782-2230-2021-2-122-135.
Texto completo da fonteRiggio, Giacomo, Angelo Gazzano, Borbála Zsilák, Beatrice Carlone e Chiara Mariti. "Quantitative Behavioral Analysis and Qualitative Classification of Attachment Styles in Domestic Dogs: Are Dogs with a Secure and an Insecure-Avoidant Attachment Different?" Animals 11, n.º 1 (23 de dezembro de 2020): 14. http://dx.doi.org/10.3390/ani11010014.
Texto completo da fonteKumar, Abhinav, Sanjay Kumar Singh, K. Lakshmanan, Sonal Saxena e Sameer Shrivastava. "A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images". ACM Transactions on Internet Technology 21, n.º 2 (junho de 2021): 1–22. http://dx.doi.org/10.1145/3424221.
Texto completo da fonteGongada, Sandhya Rani, Muktevi Chakravarthy e Bhukya Mangu. "Power system contingency classification using machine learning technique". Bulletin of Electrical Engineering and Informatics 11, n.º 6 (1 de dezembro de 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Texto completo da fonte