Login / Signup
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems.
Serhii Ya. Hilgurt
Anatolii Davydenko
Tetyana V. Matovka
Mykhailo P. Prygara
Published in:
J. Cyber Secur. Mobil. (2023)
Keyphrases
</>
security systems
rule based systems
biometric data
security mechanisms
low cost
real time
network traffic
data analysis
intrusion detection
anomaly detection
multimodal biometrics
embedded systems
knowledge acquisition
genetic programming
fuzzy sets
natural language
artificial intelligence