Mostrar el registro sencillo del ítem

dc.contributor.authorNamasudra, Suyel
dc.contributor.authorGonzález-Crespo, Rubén
dc.contributor.authorKumar, Sathish
dc.date2022
dc.date.accessioned2022-12-09T13:16:28Z
dc.date.available2022-12-09T13:16:28Z
dc.identifier.issn00457906
dc.identifier.urihttps://reunir.unir.net/handle/123456789/13884
dc.description.abstractWith the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the internet, security issues are continuously increasing due to the presence of numerous hackers who try to hack users’ personal and confidential data by using security attacks. Sometimes, they replace authentic data with their fake data. The situation becomes more critical when a large number of users access and store their personal data outside of their own domain at the same time. Attackers mainly target the financial, healthcare, and defense sectors. Therefore, there must be strong security techniques to protect confidential or personal data against hackers and malicious users.es_ES
dc.language.isoenges_ES
dc.publisherComputers and Electrical Engineeringes_ES
dc.relation.ispartofseries;vol. 100, nº 108048
dc.relation.urihttps://www.sciencedirect.com/science/article/pii/S0045790622003093?via%3Dihubes_ES
dc.rightsopenAccesses_ES
dc.subjectmachine learninges_ES
dc.subjectcybersecurityes_ES
dc.subjectVSI-mlseces_ES
dc.subjectScopus(2)es_ES
dc.subjectJCRes_ES
dc.titleIntroduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)es_ES
dc.typeotheres_ES
reunir.tag~ARIes_ES
dc.identifier.doihttps://doi.org/10.1016/j.compeleceng.2022.108048


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem