Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by Robindeniel
0
votes
Justify that KLT is an optimal transform.
answered
May 1, 2020
in
Image processing
#klt-image-transform
#klt-optimal-transform
0
votes
Explain the term digital image.
answered
May 1, 2020
in
Image processing
##digital-image
#digital-image-transform
0
votes
Write any four applications of DIP.
answered
May 1, 2020
in
Image processing
#dip-applications
#applications-dip
0
votes
What is the effect of Mach band pattern in Image processing
answered
May 1, 2020
in
Image processing
#mach-band-pattern
#image-band-pattern
0
votes
Write down the properties of 2D fourier transform in Image-processing
answered
May 1, 2020
in
Image processing
#2d-processing
#2d-image-processing
0
votes
Write down the properties of 2D fourier transform.
answered
May 1, 2020
in
Image processing
#fourier-transform
0
votes
Obtain the Hadamard transformation for N = 4
answered
May 1, 2020
in
Image processing
#image-handamard
#hadamard-transformation
0
votes
Write down the properties of Haar transform.
answered
May 1, 2020
in
Image processing
#haar-properties
#haar-transform-properties
0
votes
Threat hunters use __________.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunters
0
votes
Threat hunting and threat detection are same.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunter
#threat-detection
0
votes
Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-security-detection
#security-detection
0
votes
A potential occurrence that might compromise your assets is known as __________.
answered
Apr 30, 2020
in
Internet of Things IoT
#potential-security
0
votes
Threat hunters will be able to offer a high degree of protection only if there is a _____________.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunters
#threat-degree
0
votes
Which of the following are threat hunting platforms?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting-platform
#hunting-platform
0
votes
Which threat hunting platform was acquired by Amazon Web Services?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting-platform
#hunting-platform
0
votes
Which of the following are threat hunting techniques?
answered
Apr 30, 2020
in
Internet of Things IoT
#hunting-techniques
0
votes
Which threat hunting platform applies Artificial Intelligence to detect and hunt for cyber attacks in real time?
answered
Apr 30, 2020
in
Internet of Things IoT
#hunting-platform
#threat-hunting-platform
#threat-artificial-intelligence
0
votes
_____________ is used for identification and prevention of cyber intrusions.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-cyber-kill-chain
0
votes
Which of the following is a stage in Cyber Kill Chain?
answered
Apr 30, 2020
in
Internet of Things IoT
#cyber-kill-chain
#threat-chain
0
votes
In which stage of the cyber kill chain, the hunters are ready to strike?
answered
Apr 30, 2020
in
Internet of Things IoT
#cyber-kill-chain
#threat-chain
Page:
« prev
1
...
158
159
160
161
162
163
164
165
166
167
168
...
199
next »
...