Search

Showing total 24 results
24 results

Search Results

1. DroidRL: Feature selection for android malware detection with reinforcement learning

2. AIDTF: Adversarial training framework for network intrusion detection

3. Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review

4. Microscopic printing analysis and application for classification of source printer

5. Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution

6. Privacy-preserving certificateless public auditing supporting different auditing frequencies

7. 2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT

8. Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification

9. AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation

10. Attributes impacting cybersecurity policy development: An evidence from seven nations

11. LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning

12. Everything you control is not everything: Achieving intention-concealed visit on social networks

13. Efficient optimisation framework for convolutional neural networks with secure multiparty computation

14. TrustBuilder: A non-repudiation scheme for IoT cloud applications

15. A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric

16. Topology-theoretic approach to address attribute linkage attacks in differential privacy

17. Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants

18. S.sup.3Feature: A static sensitive subgraph-based feature for android malware detection

19. CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems

20. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions

21. An optimized differential privacy scheme with reinforcement learning in VANET

22. Towards a framework for trustworthy data security level agreement in cloud procurement

23. Spam review detection using self-organizing maps and convolutional neural networks

24. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine