Open Access
ARTICLE
Federica Uccello1,2, Marek Pawlicki3,4, Salvatore D'Antonio1, Rafał Kozik3,4, Michał Choraś3,4,*
1 Centro Direzionale, Department of Engineering, University of Naples ‘Parthenope’, Isola C4, Napoli, 80133, Italy
2 Department of Computer and Information Science, Software and Systems, Linköping University, Linköping, 58183, Sweden
3 ITTI Sp. z o.o., Poznań, 61-612, Poland
4 Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, Bydgoszcz, 85-796, Poland
* Corresponding Author: Michał Choraś. Email:
(This article belongs to the Special Issue: Artificial Intelligence Current Perspectives and Alternative Paths: From eXplainable AI to Generative AI and Data Visualization Technologies)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.062801
Received 28 December 2024; Accepted 05 March 2025; Published online 25 March 2025
View
Download
Like
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Chak Fong Cheang, Yiqin Wang,...MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research
Wei Xu, Yaodong Tao, Chunfang...An Intrusion Detection Algorithm Based on Feature Graph
Xiang Yu, Zhihong Tian, Jing Qiu,...A Convolution-Based System for Malicious URLs Detection
Chaochao Luo, Shen Su, Yanbin...