An Intelligent Machine Learning System Based on Blockchain for Smart Health Care

V Mahor, R Choudhary, S Bijrothiya… - Robotic Process …, 2023 - Wiley Online Library
Summary Blockchain and Machine Learning work together to provide the best solutions for
various jobs in the Smart Healthcare system. The emergence of these two new technologies …

Detection of cyber crime based on facial pattern enhancement using machine learning and image processing techniques

RD Jujjuri, AK Tripathi, VS Chandrika… - … intelligence for the …, 2022 - igi-global.com
Cybercrime has several antecedents, including the rapid expansion of the internet and the
wide variety of users around the world. It is now possible to use this data for a variety of …

Deception Detection And Vulnerability Analysis Using A Multi-Level Clustering Machine Learning Algorithm In Business Transactions

A Kapoor - Available at SSRN 4267942, 2022 - papers.ssrn.com
To protect criminals, fraud detection techniques are regularly improved. They make it
possible for us to spot frauds quickly and simply. We will concentrate on the issue of …

Enthusiastic Cyber Surveillance for Intimidation Comprehension on the Dark Web and the Deep Web

V Mahor, S Bijrothiya, RK Bhujade… - … Intelligence for the …, 2022 - igi-global.com
The authors offer an operational method for obtaining cyber intimidation intelligence from
diverse social platforms on the internet, notably dark-web and deep-web sites with Tor, in …

SQL-Injection Threat Analysis and Evaluation

A Kapoor - Available at SSRN 4430812, 2023 - papers.ssrn.com
Abstract A Structured Query Language (SQL) injection attack occurs on a database-driven
website when the hacker manipulates a standard SQL query. It is carried by injecting a …

Applications of quantum neural channels and constraints

A Kapoor - Available at SSRN 4284354, 2022 - papers.ssrn.com
In the last several years, there have been substantial advancements in both deep learning
and quantum computing, and better computation is a key factor in both. Recently, quantum …

Malware Inputs Detection Approach (Tool) based on Machine Learning [MIDT-SVM]

R Rawat, M Chouhan, B Garg, S TELANG… - Available at SSRN …, 2021 - papers.ssrn.com
The internet plays a significant part in our daily lives. It has become an integral part of
everyone's daily routine or way of life. The Dark Web is a virtually unidentifiable hidden layer …

Machine Learning Models in Detecting Cyber Crimes and Cyber Terrorism in India

R Jaladanki, SI Patel, I Khan… - Dark Web Pattern …, 2022 - igi-global.com
Abstract Cyber-physical systems (CPSs), which are more susceptible to a range of cyber-
attacks, play an increasingly crucial role in power system security today. Digital …

A Technique for Monitoring Cyber‐Attacks on Self‐Driving Automobiles‐Based VANET

V Mahor, S Bijrothiya, R Mishra… - … Vehicles Volume 2 …, 2022 - Wiley Online Library
In the last few years,“vehicular‐ad‐hoc‐networks”(VANETs) have become a popular study
topic. VANETs are attracting attention from academia and business people both because of …

Tapering Malicious Language for Identifying Fake Web Content

K Sharmila - Using Computational Intelligence for the Dark Web …, 2022 - igi-global.com
The neoteric occurrence, the pandemic, and global crisis entails the extensive use of web
portals to unfurl information. While this has built the cognizance of the common man, the …