Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25 Bias in Training DataInformation SecurityMachine Learning Framework 2017.07.25 2025.05.28 Literature Database