关注
Atdhe Buja
Atdhe Buja
Associate Professor of Cybersecurity and DF, Commonwealth University of Pennsylvania Bloomsburg
在 commonwealthu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cyber security standards for the industrial internet of things (iiot)–a systematic review
A Buja, M Apostolova, A Luma, Y Januzaj
2022 International Congress on Human-Computer Interaction, Optimization and …, 2022
162022
Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment
A Buja, M Apostolova, A Luma
2023 12th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2023
62023
Evaluating Security Mechanisms for Wireless Sensor Networks in IoT and IIoT
T Zhukabayeva, A Buja, M Pacolli
Journal of Robotics and Control (JRC) 5 (4), 931-943, 2024
52024
AN ONLINE SQL VULNERABILITY ASSESSMENT TOOL AND IT’S IMPACT ON SMEs
A Buja, ZB Luma
International Journal of Advanced Research in Computer Science 13 (5), 2022
22022
PROACTIVE MONITORING FOR SMEs USING APPINSIGHT.
A Buja, ZB Luma
International Journal of Advanced Research in Computer Science 13 (5), 2022
12022
Enhancing IoT Security Development and Evaluation of a Predictive Machine Learning Model for Attack Detection. Advances in Artificial Intelligence and Machine Learning. 2024; 4 …
A Buja
2024
Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security. Advances in Artificial Intelligence and Machine Learning. 2024; 4 (2): 128
A Buja
2024
A Model Proposal of Cybersecurity for the IIoT: Enhancing IIoT Cybersecurity through Machine Learning and Deep Learning Techniques. Advances in Artificial Intelligence and …
A Buja
Computing (MECO) 2023, 1-5, 2023
2023
A Comprehensive Survey on Student Perceptions of Online Threat from Cyberbullying in Kosova
A Buja, A Luma
International Conference on Computational Intelligence and Data Engineering …, 2022
2022
Innovative Machine Learning Model Design for Predictive IoT Security Attacks Advances in Artificial Intelligence and Machine Learning. 2024; 4 (2): 139
A Buja
Machine Learning 14, 47-64, 2022
2022
Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy
A Buja
2018
Research on system communication by using unified registry model & elements
K Gashi, A Buja, F Idrizi
2017
系统目前无法执行此操作,请稍后再试。
文章 1–12