Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3222307
Abstract: In recent years, the digital world has advanced significantly, particularly on the Internet, which is critical given that many of our activities are now conducted online. As a result of attackers’ inventive techniques, the risk…
read more here.
Keywords:
using machine;
machine learning;
urls using;
malicious urls ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"
DOI: 10.1109/tvlsi.2022.3167606
Abstract: System-on-chip (SoC) developers utilize intellectual property (IP) cores from third-party vendors due to increasing design complexity, cost, as well as time-to-market constraints. A typical SoC consists of a wide variety of IP cores [such as…
read more here.
Keywords:
intellectual property;
watermarking detecting;
property cores;
digital watermarking ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/3241216
Abstract: The World Wide Web services are essential in our daily lives and are available to communities through Uniform Resource Locator (URL). Attackers utilize such means of communication and create malicious URLs to conduct fraudulent activities…
read more here.
Keywords:
machine learning;
learning models;
deep learning;
learning deep ... See more keywords