Analyzing Object Detection Algorithms for Cyber Threat Scenario

A Kapoor - Available at SSRN 4284372, 2022 - papers.ssrn.com
This study compares several object identification methods that employ convolutional neural
networks to conduct object detection in order to discover the greatest threat and feasible …

Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web

J Shruthi, MS Sumathi, R Bharathi… - Dark Web Pattern …, 2022 - igi-global.com
Companies must foresee most critical security threats to keep one step ahead of attackers.
Because attackers always refine their techniques to avoid detection and because attackers …

Opinion Mining Assessment For Threat Analysis

A Kapoor - Available at SSRN 4284375, 2022 - papers.ssrn.com
In this paper, we present a conclusion mining framework to distinguish item highlights and
conclusions from audit reports. The highlights and conclusions are removed utilizing …

Cloud Computing Threats Paradigms and Issues

A Kapoor - Available at SSRN 4284368, 2022 - papers.ssrn.com
Cloud Computing is the on demand availability of computer system resources, especially
data storage, computing power, collection of services with 24* 7 availability with 'all over …

A Evaluation Of Fault Resilience Methods In The Threat Of Cloud Computing

A Kapoor - Available at SSRN 4267940, 2022 - papers.ssrn.com
The term" cloud computing" refers to a way of doing computing where customers are given
access to information technology capabilities as a service through the Internet without …

Assessment Of Intrusion Monitoring Methods Using Digital Forensics In A Cloud Infrastructure

A Kapoor - Available at SSRN 4267941, 2022 - papers.ssrn.com
The cloud computing is the favoured option for all IT organisations since it offers its
consumers flexible, pay-per-use services. Due to its open and distributed nature, which …

Forecasting of Malware Taxonomy Using ML Classifiers

A Kapoor - Available at SSRN 4267945, 2022 - papers.ssrn.com
The global proliferation of vulnerability databases has both positive and negative effects.
They are known by malware researchers, representatives of the industry, and end users to …

Biometrics In Cyber Security For Fraud Surveillance

A Kapoor - Available at SSRN 4267947, 2022 - papers.ssrn.com
A direct or indirect dependence on computers, highly integrated computer networks and
communication systems, electronic data storage and high transfer based devices …

Twitter Crime analysis and categorization

R Rawat, V Mahor, K Pachlasiya, B Garg… - … on" Methods and …, 2021 - papers.ssrn.com
Abstract Online Social Network Platform is the hub of criminal activities. Among them twitter
is the most popular one containing millions of media contents and thus can be used for …

[引用][C] Drug Trafficking crime analysis using Systematic literature Review (SLR) within Darkweb