Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

Apelid: Enhancing real-time intrusion detection with augmented wgan and parallel ensemble learning

HV Vo, HP Du, HN Nguyen - Computers & Security, 2024 - Elsevier
This paper proposes an AI-powered intrusion detection method that improves intrusion
detection performance by increasing the quality of the training set and employing numerous …

Monitoring of phosphorus compounds in the influence zone affected by nuclear power plant water discharge in the Styr River (Western Ukraine): Case study

P Kuznietsov, O Biedunkova, Y Trach - Sustainability, 2023 - mdpi.com
The main causes of surface water pollution with phosphate ions are various human
activities. Monitoring the content of phosphorus compounds in surface waters is important for …

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

AH Salem, SM Azzam, OE Emam, AA Abohany - Journal of Big Data, 2024 - Springer
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …

[HTML][HTML] An improved crow search optimization with Bi-LSTM model for identification and classification of COVID-19 infection from chest X-Ray images

A Rayan, AS Alaerjan - Alexandria Engineering Journal, 2023 - Elsevier
Deep learning has become an effective detection method as coronavirus disease 2019
(COVID-19) incidences are increasing quickly. Nevertheless, finding the best accurate …

[HTML][HTML] Adapting user experience with reinforcement learning: Personalizing interfaces based on user behavior analysis in real-time

A Khamaj, AM Ali - Alexandria Engineering Journal, 2024 - Elsevier
Developing a dynamic, personalized user interface that changes in real-time in response to
user behavior is the goal. This paper supplies a modern method to beautify consumers …

A Hybrid Modified Deep Learning Architecture for Intrusion Detection System with Optimal Feature Selection

N Kumar, S Sharma - Electronics, 2023 - mdpi.com
With the exponentially evolving trends in technology, IoT networks are vulnerable to serious
security issues, allowing intruders to break into networks without authorization and …

An optimized neural network for prediction of security threats on software testing

RA Khan - Computers & Security, 2024 - Elsevier
Software testing involves evaluating and confirming a software program or product to ensure
it operates according to its intended functionality. Testing offers advantages like bug …

[HTML][HTML] Pareto parameter estimation by merging locally weighted median of multiple neural networks and weighted least squares

W Aydi, M Alatiyyah - Alexandria Engineering Journal, 2024 - Elsevier
The Pareto distribution plays an important role in many data analysis tasks. An important
aspect of this distribution is the estimation of its parameters. Several studies use classical …

MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and …

A El-Sayed, W Said, A Tolba, Y Alginahi… - Computers and Electrical …, 2024 - Elsevier
The ever-increasing complexity of the Internet of Things (IoT) environment demands robust
and adaptable intrusion detection frameworks, as existing approaches struggle with real …