-
1
-
2تقرير
-
3دورية أكاديمية
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest; Silalahi, Swardiantara, Ahmad, Tohari, Studiawan, Hudan, Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest and Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest 2024. Severity-oriented multiclass drone flight logs anomaly detection. IEEE Access 12 , 64252 - 64266. 10.1109/ACCESS.2024.3396926 https://doi.org/10.1109/ACCESS.2024.3396926Test file https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest
الإتاحة: https://doi.org/10.1109/ACCESS.2024.3396926Test
https://orca.cardiff.ac.uk/id/eprint/168794Test/
https://orca.cardiff.ac.uk/id/eprint/168794/1/Severity-Oriented_Multiclass_Drone_Flight_Logs_Anomaly_Detection.pdfTest -
4دورية أكاديمية
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest; Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest, Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest, Ieropoulos, Vasilis https://orca.cardiff.ac.uk/view/cardiffauthors/A2566714N.htmlTest and Spyridopoulos, Theodoros https://orca.cardiff.ac.uk/view/cardiffauthors/A2745464G.htmlTest orcid:0000-0001-7575-9909 orcid:0000-0001-7575-9909 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5 (2) , pp. 356-380. 10.3390/iot5020018 https://doi.org/10.3390/iot5020018Test file https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest
الإتاحة: https://doi.org/10.3390/iot5020018Test
https://orca.cardiff.ac.uk/id/eprint/169518Test/
https://orca.cardiff.ac.uk/id/eprint/169518/1/IoT-05-00018.pdfTest -
5دورية أكاديمية
المؤلفون: Burnap, Peter, Anthi, Eirini, Reineckea, Philipp, Williams, Lowri, Caoa, Fengnian, Aldmoura, Rakan, Jones, Kevin
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest; Burnap, Peter https://orca.cardiff.ac.uk/view/cardiffauthors/A065214B.htmlTest orcid:0000-0003-0396-633X orcid:0000-0003-0396-633X, Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest, Reineckea, Philipp, Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest, Caoa, Fengnian, Aldmoura, Rakan and Jones, Kevin 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2) , pp. 340-356. 10.3390/jcp4020017 https://doi.org/10.3390/jcp4020017Test file https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest
الإتاحة: https://doi.org/10.3390/jcp4020017Test
https://orca.cardiff.ac.uk/id/eprint/169443Test/
https://orca.cardiff.ac.uk/id/eprint/169443/1/jcp-04-00017.pdfTest -
6دورية أكاديمية
المؤلفون: Williams, Lowri, Anthi, Eirini, Burnap, Peter
وصف الملف: application/pdf
العلاقة: https://orca.cardiff.ac.uk/id/eprint/167555/1/BDCC-08-00038.pdfTest; Williams, Lowri https://orca.cardiff.ac.uk/view/cardiffauthors/A211245F.htmlTest, Anthi, Eirini https://orca.cardiff.ac.uk/view/cardiffauthors/A1118207I.htmlTest and Burnap, Peter https://orca.cardiff.ac.uk/view/cardiffauthors/A065214B.htmlTest orcid:0000-0003-0396-633X orcid:0000-0003-0396-633X 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8 (4) 10.3390/bdcc8040038 https://doi.org/10.3390/bdcc8040038Test file https://orca.cardiff.ac.uk/id/eprint/167555/1/BDCC-08-00038.pdfTest
الإتاحة: https://doi.org/10.3390/bdcc8040038Test
https://orca.cardiff.ac.uk/id/eprint/167555Test/
https://orca.cardiff.ac.uk/id/eprint/167555/1/BDCC-08-00038.pdfTest -
7تقرير
المؤلفون: Anthi, Eirini, Williams, Lowri, Rhode, Matilda, Burnap, Pete, Wedgbury, Adam
مصطلحات موضوعية: Computer Science - Machine Learning, Computer Science - Cryptography and Security, Electrical Engineering and Systems Science - Signal Processing, Statistics - Machine Learning
الوصول الحر: http://arxiv.org/abs/2004.05005Test
-
8
المؤلفون: Mistry, Jaina, Chuguransky, Sara, Williams, Lowri, Qureshi, Matloob, Salazar, Gustavo A., Sonnhammer, Erik L. L., Tosatto, Silvio C. E., Paladin, Lisanna, Raj, Shriya, Richardson, Lorna J., Finn, Robert D., Bateman, Alex
المصدر: Nucleic Acids Research. 49(D1):D412-D419
مصطلحات موضوعية: Natural Sciences, Biological Sciences, Naturvetenskap, Biologiska vetenskaper
وصف الملف: print
الوصول الحر: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-191717Test
https://doi.org/10.1093/nar/gkaa913Test -
9
-
10دورية أكاديمية
المؤلفون: Burnap, Pete, Anthi, Eirini, Reineckea, Philipp, Williams, Lowri, Cao, Fengnian, Aldmoura, Rakan, Jones, Kevin
المصدر: Journal of Cybersecurity & Privacy; Jun2024, Vol. 4 Issue 2, p340-356, 17p
مصطلحات موضوعية: CYBERTERRORISM, AUTOMATION, CYBER intelligence (Computer security), DATA science, MACHINE learning