M Roshanaei - Journal of Information Security, 2024 - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives, ensuring the security of mobile applications has become increasingly crucial. Mobile …
O Dayan, L Wolf, F Wang… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The cyber detection industry focuses on analyzing the behavior of threats in order to develop IOCs and triggers. This process makes the detection always behind the attackers, as there is …
One of the most extensively used technologies for improving the security of IoT devices is blockchain technology. It is a new technology that can be utilized to boost the security. It is a …
IS Alansari - Journal of Software Engineering and Applications, 2023 - scirp.org
The Arabic Dialect (AD) detection method involves analyzing the matching sound wave for various characteristics that identify the speaker's dialect. Among these features are accent …
Today, cyber attackers use Artificial Intelligence (AI) to boost the sophistication and scope of their attacks. On the defense side, AI is used to improve defense plans, robustness …
The optimization of the energy grid is a critical task for ensuring a sustainable and efficient energy future. Deep machine learning techniques have the potential to improve energy grid …
Abstract Machine learning [ML] is becoming more effective in the field of cybersecurity. The main objective of applying ML in cybersecurity is to make malware detection more …
N Hegde, SS Manvi - Convergence of Deep Learning and Internet of …, 2023 - igi-global.com
The continued growth and widespread use of the internet benefit many network users in various ways. Meanwhile, network protection becomes increasingly essential as the internet …
Antimicrobial resistance (AMR) is emerging as a potential threat to many lives worldwide. It is very important to understand and apply effective strategies to counter the impact of AMR …