2021
DOI: 10.1016/j.patrec.2021.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Protection motivation theory using multi-factor authentication for providing security over social networking sites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…Profound learning procedures assume an essential part in working with the translation and show of such information. They have been executed in MRI [20], fMRI [ultrasound [28], [11], X-bar [4], and different various modalities. These systems have helped clinicians in the imaging and ID of disorders, for instance, diabetic retinopathy [67] and melanoma [3].…”
Section: Data Visualization Applicationsmentioning
confidence: 99%
“…Profound learning procedures assume an essential part in working with the translation and show of such information. They have been executed in MRI [20], fMRI [ultrasound [28], [11], X-bar [4], and different various modalities. These systems have helped clinicians in the imaging and ID of disorders, for instance, diabetic retinopathy [67] and melanoma [3].…”
Section: Data Visualization Applicationsmentioning
confidence: 99%
“…Each time a new layer of characteristics or features is added to the belief network, the lower bound on the log likelihood of the training data set will increase. [9] Deep Belief Network's applications include Image Recognition, Video Recognition, and Motion Capture data. Motion capture data encompasses the tracking of the movement of objects or people, as well as the utilisation of deep belief networks.…”
Section: Ids Architecturementioning
confidence: 99%
“…[2] The specially appointed network is made out of mobile gadgets with practically no decent foundation, creating it hard to apply the concentrated organization and control strategies. Customary wired access of networks control strategies like firewalls, Virtual Confidential Organization (VPN) and confirmation administrations will not be utilized straightforwardly to get the ad-hoc network Invasion in VANETs ordered into five significant gatherings, these are attack of confidentiality and integrity, Assault on Classification, Assaults on Accessibility, Assaults on Responsibility and, Assaults on Verification [3] . The Interruption Recognition Frameworks can be utilized for the organization fragments also on the singular hubs in VANET.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, vehicle networks present new troubles. not present in conventional remote networks [7] in light of the fact that:…”
Section: Introductionmentioning
confidence: 99%