Login / Signup
An Adaptive Policy-Based Anomaly Object Control System for Enhanced Cybersecurity.
Won Sakong
Wooju Kim
Published in:
IEEE Access (2024)
Keyphrases
</>
control system
d objects
data objects
fuzzy logic
target object
control algorithm
complex objects
control strategy
deformable objects
object model
object segmentation
spatial relations
keypoints
network traffic
intrusion detection
control method
action selection
database