Search

Showing total 32 results
32 results

Search Results

1. DroidRL: Feature selection for android malware detection with reinforcement learning

2. AIDTF: Adversarial training framework for network intrusion detection

3. Artificial Intelligence and Machine Learning (AI/ML) for Drug Development.

4. Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review

5. Microscopic printing analysis and application for classification of source printer

6. Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices

7. Local universities prep for burgeoning AI landscape

8. Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution

9. Privacy-preserving certificateless public auditing supporting different auditing frequencies

10. 2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT

11. Semantic matching in machine reading comprehension: An empirical study

12. Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification

13. AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation

14. Attributes impacting cybersecurity policy development: An evidence from seven nations

15. LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning

16. Everything you control is not everything: Achieving intention-concealed visit on social networks

17. Efficient optimisation framework for convolutional neural networks with secure multiparty computation

18. TrustBuilder: A non-repudiation scheme for IoT cloud applications

19. A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric

20. Topology-theoretic approach to address attribute linkage attacks in differential privacy

21. Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants

22. A bias--variance evaluation framework for information retrieval systems

23. S.sup.3Feature: A static sensitive subgraph-based feature for android malware detection

24. CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems

25. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions

26. An optimized differential privacy scheme with reinforcement learning in VANET

27. Machine Learning and feature engineering-based study into sarcasm and irony classification with application to cyberbullying detection

28. Blockchain-based royalty contract transactions scheme for Industry 4.0 supply-chain management

29. Closed-loop and open-loop authentication protocols for blockchain-based IoT systems

30. Towards a framework for trustworthy data security level agreement in cloud procurement

31. Spam review detection using self-organizing maps and convolutional neural networks

32. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine