[HTML][HTML] Part of speech tagging: a systematic review of deep learning and machine learning approaches

A Chiche, B Yitagesu - Journal of Big Data, 2022 - Springer
Natural language processing (NLP) tools have sparked a great deal of interest due to rapid
improvements in information and communications technologies. As a result, many different …

[Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems

R Malik, Y Singh, ZA Sheikh, P Anand… - Journal of Advanced …, 2022 - Wiley Online Library
Internet of things (IoT) services are turning out to be more domineering with the rising
security considerations fading with time. All this owes to the propagating heterogeneity and …

Contemporary survey on effectiveness of machine and deep learning techniques for cyber security

P Suresh, K Logeswaran, P Keerthika, RM Devi… - Machine Learning for …, 2022 - Elsevier
Abstract Machine learning (ML) and deep learning (DL) techniques are applied in a broad
range of application fields where it proves its supremacy over other methods. ML and DL …

Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network

S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for
securing wireless sensor networks (WSNs) are unable to attain the required detection …

[HTML][HTML] The flexural strength prediction of carbon fiber/epoxy composite using artificial neural network approach

V Phunpeng, K Saensuriwong, T Kerdphol… - Materials, 2023 - mdpi.com
There is a developing demand for natural resources because of the growing population.
Alternative materials have been developed to address these shortages, concentrating on …

[PDF][PDF] An IoT environment based framework for intelligent intrusion detection

H Safwan, Z Iqbal, R Amin, MA Khan… - CMC Comput. Mater …, 2023 - researchgate.net
Software-defined networking (SDN) represents a paradigm shift in network traffic
management. It distinguishes between the data and control planes. APIs are then used to …

An optimized auto-encoder based approach for detecting zero-day cyber-attacks in computer network

K Roshan, A Zafar - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
Machine Learning and Deep Learning have been applied in Cybersecurity for more than a
decade, such as cyber-attack detection, intrusion detection, network traffic classification, and …

Anomaly Detection in Credit Card Transaction using Deep Learning Techniques

G Ketepalli, S Tata, S Vaheed… - 2022 7th International …, 2022 - ieeexplore.ieee.org
One of the most convenient ways to pay is by using a credit card. For both online and offline
transactions, it is a handy tool. Credit card numbers are used extensively in online …

Least Square Support Vector Machine based Intrusion Detection System in IoT

P Akhther, A Maryposonia… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The IoT (Internet of Things) is an ever-expanding system of interconnected computing
devices. It'sa term for when real-world items can communicate with one another via data …

The stability of State information in the face of terrorist threats

YM Bidzilya, YO Solomin, HV Shapovalova… - Cuestiones …, 2021 - elibrary.kubg.edu.ua
The objective of the study is to identify the key factors of the stability of state information in
the face of terrorist threats based on the review of existing research in this area, and to …