REFERENCES
J.FlynnandC.Giannetti,‘‘Usingconvolutionalneuralnetworkstomaphousessuitable
forelectricvehiclehomecharging,’’AI,vol.2,no.1,pp.135–149,Mar.2021[10]Cisco.
(2020).CiscoAnnualInternetReport(2018–2023).
L.Taheri,A.F.A.Kadir,andA.H.Lashkari,‘‘ExtensibleAndroidmal-waredetection
andfamilyclassificationusingnetwork-flowsandAPI-calls,’’inProc.Int.CarnahanConf.
Secur.Technol.(ICCST),Oct.2019,pp.1–8.
Q.Chen,‘‘Towardrealizingself-protectinghealthcareinformationsys-tems:Designand
securitychallenges,’’inAdvancesinComputers,vol.114.Amsterdam,TheNetherlands:
Elsevier,2019.
S.Peisert,R.Gentz,J.Boverhof,C.McParland,S.Engle,A.Elbashandy,andD.Gunter,
‘‘LBNLopenpowerdata,’’LBNL,Berkeley,CA,USA,Tech.Rep.,2017
13-10-2023
24