Algorithms in low-code-no-code for research applications: a practical review

F Sufi - Algorithms, 2023 - mdpi.com
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20
years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection

MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …

Energy-efficient and secure load balancing technique for SDN-enabled fog computing

J Singh, P Singh, EM Amhoud, M Hedabou - Sustainability, 2022 - mdpi.com
The number of client applications on the fog computing layer is increasing due to
advancements in the Internet of Things (IoT) paradigm. Fog computing plays a significant …

[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security

NO Aljehane, HA Mengash, MM Eltahir… - Alexandria Engineering …, 2024 - Elsevier
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …

Towards data security assessments using an IDS security model for cyber-physical smart cities

AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …

A novel feature selection approach to classify intrusion attacks in network communications

M Ozkan-Okay, R Samet, Ö Aslan, S Kosunalp, T Iliev… - Applied Sciences, 2023 - mdpi.com
The fast development of communication technologies and computer systems brings several
challenges from a security point of view. The increasing number of IoT devices as well as …

Bibliometric literature review of adaptive learning systems

D Koutsantonis, K Koutsantonis, NP Bakas, V Plevris… - Sustainability, 2022 - mdpi.com
In this review paper, we computationally analyze a vast volume of published articles in the
field of Adaptive Learning, as obtained by the Scopus Database. Particularly, we use a …

Connect2NFT: A web-based, blockchain enabled NFT Application with the Aim of Reducing Fraud and ensuring authenticated social, non-human verified digital …

J Bellagarda, AM Abu-Mahfouz - Mathematics, 2022 - mdpi.com
As of 2022, non-fungible tokens, or NFTs, the smart contract powered tokens that represent
ownership in a specific digital asset, have become a popular investment vehicle. In 2021 …

Three-way decisions in generalized intuitionistic fuzzy environments: survey and challenges

J Ding, C Zhang, D Li, J Zhan, W Li, Y Yao - Artificial Intelligence Review, 2024 - Springer
Enhancing decision-making under risks is crucial in various fields, and three-way decision
(3WD) methods have been extensively utilized and proven to be effective in numerous …