Login / Signup
Method of Training and Implementation on the Basis of Neural Networks of Cryptographic Data Protection.
Ivan Tsmots
Vasyl Teslyuk
Yurii Lukashchuk
Yurii Opotiak
Published in:
COLINS (2022)
Keyphrases
</>
neural network
cloud computing
support vector machine
input data