Showing 121 - 140 of 14,127

121

SecureQwen: Leveraging LLMs for vulnerability detection in python codebases
Mechri, Abdechakour ; Ferrag, Mohamed Amine ; Debbah, Merouane
In Computers & Security January 2025 148

Academic journal
Save to List
122

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges
Radaković Mladen U. ; Marjanović Marina D.
Tehnika, Vol 78, Iss 2, Pp 187-194 (2023)

machine learning artificial intelligence python cyber security computer network intrusion detection
Academic journal
Save to List
123

DeVAIC: A tool for security assessment of AI-generated code
Cotroneo, Domenico ; De Luca, Roberta ; Liguori, Pietro
In Information and Software Technology January 2025 177

Academic journal
Save to List
124

SecureCode v2.0: A Production-Grade Dataset for Training Security-Aware Code Generation Models
Thornton, Scott

Cryptography and Securit... Artificial Intelligence Computation and Language Machine Learning
Report
Save to List
125

SoK: Understanding (New) Security Issues Across AI4Code Use Cases
Wu, Qilong ; Li, Taoran ; Zhou, Tianyang ; et al.

Cryptography and Securit... Artificial Intelligence
Report
Save to List
126
127

Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis
Abecidan, Rony ; Itier, Vincent ; Boulanger, Jérémie ; et al.

Out-of-Distribution Gene... Data shift Covariate Shift Unsupervised Domain Adap... Domain Adaptation Data Adaptation
Electronic Resource
Save to List
128

A privacy-preserving based cyber security for communication attacks in active power distribution networks
Tatipatri, Naveen ; L, Arun S
In International Journal of Electrical Power and Energy Systems November 2025 172

Academic journal
Save to List
129

DEVELOPMENT OF A CLUSTERING ALGORITHM FOR PARAMETERS OF EXPLOSIVE OBJECTS BASED ON A COMPREHENSIVE INDICATOR.
Laktionov, O. ; Yanko, A. ; Pedchenko, N.
Scientific Bulletin of National Mining University; 2025, Issue 4, p160-167, 8p

CLUSTERING algorithms CLUSTER analysis (Statis... ELECTRONIC data processi... NATIONAL security PYTHON programming langu... MILITARY weapons
Academic journal
Save to List
130

Developing an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing.
Zhuang, Yuan
SPIN (2010-3247); Jun2025, Vol. 15 Issue 2, p1-9, 9p

ARTIFICIAL intelligence CYBERTERRORISM FEATURE extraction PYTHON programming langu... EDGE computing
Academic journal
Save to List
131

Research on the Effectiveness of Using the Python Language for Creating Cyber Security and Information Protection Applications ; Дослідження ефективності застосування мови Pyton для створення додатків кібербезпеки та захисту інформації
Шуліпа Н. С. (Shulipa N. S.) ; Мазурик А. В. (Mazuryk A. V.)
Modern Information Security; № 3 (2023); 32-37 ; Современная защита информации; № 3 (2023); 32-37 ; Сучасний захист інформації; № 3 (2023); 32-37

Academic journal
Save to List
132

Anomaly Detection and Intrusion Prevention Using ML in Python
Nishant Kumar Singh ; Prof. Sarwesh Site
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. :1-9

Academic journal
Save to List
134

Enhanced personally identifiable information data masker using natural language processing and computer vision.
Hajari, Manu ; Balbudhe, Aniruddha Anil ; Annavarapu, Tejesh ; et al.
AIP Conference Proceedings; 2025, Vol. 3263 Issue 1, p1-8, 8p

PRIVACY DATA protection PYTHON programming langu... DATA protection software COMPUTATIONAL linguistic... COMPUTER vision
Conference
Save to List
135

Enhancing cloud security with authentication for securing sensitive information
Satheesh, Kavuri K.S.V.A. ; Sree, T. Krishna
In Pattern Recognition March 2026 171 Part B

Academic journal
Save to List
137

Enhancing security measures for student-involved system using stochastic random process methodology compared with Petri net Process.
Pallavi, D. ; Anithaashri, T. P.
AIP Conference Proceedings; 2024, Vol. 2871 Issue 1, p1-6, 6p

STOCHASTIC systems PETRI nets STOCHASTIC processes DATA packeting SECURITY systems PYTHON programming langu...
Conference
Save to List
138

Using software metrics for predicting vulnerable classes in java and python based systems.
Sultana, Kazi Zakia ; Anu, Vaibhav ; Chong, Tai-Yin
Information Security Journal: A Global Perspective. 2024, Vol. 33 Issue 3, p251-267. 17p.

OBJECT-oriented programm... PROGRAMMING languages FORECASTING SOFTWARE measurement PYTHON programming langu... PYTHONS
Academic journal
Save to List
139

Computer Network Security Optimization Model Based on Improved Neural Network Algorithm.
Wang, Hanzhao ; Wang, Xueting
International Journal of High Speed Electronics & Systems. Aug2025, p1. 24p.

COMPUTER network securit... ARTIFICIAL neural networ... MATHEMATICAL optimizatio... CYBERTERRORISM ELECTRONIC data processi... INTRUSION detection syst...
Academic journal
Save to List
140

MobiAuth: Blockchain-driven decentralized authentication for enhanced security and privacy in mobile networks
Dewangan, Narendra K. ; Shankar, Gauri
In Ad Hoc Networks 1 February 2026 181

Academic journal
Save to List

Filter