2020
DOI: 10.1007/978-3-030-50439-7_30
|View full text |Cite
|
Sign up to set email alerts
|

Computing with Words in Maritime Piracy and Attack Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…To counteract this threat, some researchers have proposed models that combine information from onboard sensors and cameras with intelligence from external sources for early detection of hacking threats, which have shown promising results. However, it lacks real-time updates for the context of the situation [ 48 ].…”
Section: Resultsmentioning
confidence: 99%
“…To counteract this threat, some researchers have proposed models that combine information from onboard sensors and cameras with intelligence from external sources for early detection of hacking threats, which have shown promising results. However, it lacks real-time updates for the context of the situation [ 48 ].…”
Section: Resultsmentioning
confidence: 99%