Found 3,197 presentations matching your search
The “You Only Look Once,” or YOLO, family of models are a series of end-to-end deep learning mod...
To spot intruders in network security, monitor for unusual activities like unauthorized access attem...
In the power grid, communication networks play an important role in exchanging smart grid-based info...
Lung cancer is a significant public health issue. So Early detection and diagnosis of lung cancer ca...
Network Security Fundamentals focus on protecting the integrity, confidentiality, and availability o...
If you’re still defending your network without AI — you’re already behind the curve. From aut...
Every connected device needs an IP address to communicate on a network. Both mobile devices and IoT ...
This presentation on Network Security Essentials will provide an overview of fundamental concepts an...
Nowadays, a variety of technologies on autonomous vehicles have been extensively developed, includin...
🚀 AI & Machine Learning in Lung Cancer Detection 🏥🧠 This slides delves into the role o...
Recent improvements in the internet of things (IoT), cloud services, and network data variety have i...
Manually picking the flowers of the Damask rose is significantly challenging due to the numerous tho...
With the digital infrastructure of tomorrow being developed in Saudi Arabia, Intelligent Defense for...
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2025/10/object...
Introducing Cognitive Threat Analytics (CTA), Cisco's automated breach detection technology base...
Computer networking is the practice of connecting multiple devices to share resources and communicat...
An Intrusion Detection System (IDS) functions as a vigilant security guard for your computer network...
Endpoint security plays a vital role in safeguarding devices such as laptops, desktops, and mobile s...
This study presents a machine learning-based approach for proactive video codec error detection, ens...
Operation Analysts Tools P1 Module 1: Introduction to SIEM Done Module 2: Network Threats Done Modul...
Foretm implemented a MITM attack using Ettercap in a virtual environment between two machines (Linux...
The incorporation of Artificial Intelligence (AI), especially deep learning models, into cybersecuri...
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and...
A plethora of national vital infrastructures connected to internet of things (IoT) networks may trig...