Javascript must be enabled to continue!
Correction: A. Alissa et al. Feature Subset Selection Hybrid Deep Belief Network Based Cybersecurity Intrusion Detection Model. Electronics 2022, 11, 3077
View through CrossRef
In the original publication [...]
Title: Correction: A. Alissa et al. Feature Subset Selection Hybrid Deep Belief Network Based Cybersecurity Intrusion Detection Model. Electronics 2022, 11, 3077
Description:
In the original publication [.
].
Related Results
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose
The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Supervisory control and data acquisition (SCADA) systems are vulnerable to cyberattacks; hence, cybersecurity is a major concern. Hybrid methodologies using advanced machine learni...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
Education and empire, old and new: HR 3077 and the resurgence of the US university
Education and empire, old and new: HR 3077 and the resurgence of the US university
This essay examines HR 3077, the 2003 International Studies in Higher Act, which sought to tie federal funding for university-based area studies programs to the interests of the US...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...

