-
1
-
2
-
3تقرير
-
4تقرير
المؤلفون: Pratomo, Baskoro Adi, Jackson, Toby, Burnap, Pete, Hood, Andrew, Anthi, Eirini
الوصول الحر: http://arxiv.org/abs/2310.18165Test
-
5تقرير
المؤلفون: Belarbi, Othmane, Spyridopoulos, Theodoros, Anthi, Eirini, Mavromatis, Ioannis, Carnelli, Pietro, Khan, Aftab
الوصول الحر: http://arxiv.org/abs/2306.02715Test
-
6تقرير
المصدر: ACM Transactions on Cyber-Physical Systems 2022
مصطلحات موضوعية: Computer Science - Cryptography and Security
الوصول الحر: http://arxiv.org/abs/2202.12179Test
-
7رسالة جامعية
-
8دورية أكاديمية
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest; Silalahi, Swardiantara, Ahmad, Tohari, Studiawan, Hudan, Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest and Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest 2024. Severity-oriented multiclass drone flight logs anomaly detection. IEEE Access 12 , 64252 - 64266. 10.1109/ACCESS.2024.3396926 https://doi.org/10.1109/ACCESS.2024.3396926Test file https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest
الإتاحة: https://doi.org/10.1109/ACCESS.2024.3396926Test
https://orca.cardiff.ac.uk/id/eprint/168794Test/
https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest -
9دورية أكاديمية
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest; Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest, Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest, Ieropoulos, Vasilis https://orca.cardiff.ac.uk/view/cardiffauthors/A2566714N.htmlTest and Spyridopoulos, Theodoros https://orca.cardiff.ac.uk/view/cardiffauthors/A2745464G.htmlTest orcid:0000-0001-7575-9909 orcid:0000-0001-7575-9909 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5 (2) , pp. 356-380. 10.3390/iot5020018 https://doi.org/10.3390/iot5020018Test file https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest
الإتاحة: https://doi.org/10.3390/iot5020018Test
https://orca.cardiff.ac.uk/id/eprint/169518Test/
https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest -
10دورية أكاديمية
المؤلفون: Burnap, Peter, Anthi, Eirini, Reineckea, Philipp, Williams, Lowri, Caoa, Fengnian, Aldmoura, Rakan, Jones, Kevin
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest; Burnap, Peter https://orca.cardiff.ac.uk/view/cardiffauthors/A065214B.htmlTest orcid:0000-0003-0396-633X orcid:0000-0003-0396-633X, Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest, Reineckea, Philipp, Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest, Caoa, Fengnian, Aldmoura, Rakan and Jones, Kevin 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2) , pp. 340-356. 10.3390/jcp4020017 https://doi.org/10.3390/jcp4020017Test file https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest
الإتاحة: https://doi.org/10.3390/jcp4020017Test
https://orca.cardiff.ac.uk/id/eprint/169443Test/
https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest