Augmented Analytics an Innovative Paradigm

T Guarda, I Lopes - International Conference on Innovations in Bio …, 2022 - Springer
Business intelligence (BI) and analytics are a set of techniques, methodologies, and tools
used in the analysis of business data, which allow users (decision makers) to have a clearer …

[HTML][HTML] Модель выявления аномальных транзакций биткоинов на основе машинного обучения

ЕВ Фельдман, АН Ручай, ВК Матвеева… - Челябинский физико …, 2021 - cyberleninka.ru
Данная статья посвящена разработке надёжной модели выявления аномальных
транзакций биткоинов, которые могут участвовать в схемах< отмывания> денег и …

Forecasting Commercial Customers Credit Risk Through Early Warning Signals Data: A Machine Learning based Approach

M Machado, J Osterrieder, D Chen - Available at SSRN 4754568, 2024 - papers.ssrn.com
This study introduces an innovative Early Warning System (EWS) for credit portfolio
monitoring for commercial customers at a large international bank headquartered in The …

Principles for Security

FJ Furrer - Safety and Security of Cyber-Physical Systems …, 2022 - Springer
Security principles form the foundation for the creation and operation of security-critical
cyber-physical systems. They have their roots in theoretical work and long-standing, proven …

Cyber Security maturity model capability at the airports

O Malhotra, S Dey, E Foo, M Helbig - 2021 - aisel.aisnet.org
Cybersecurity is an important facilitator for essential aviation safety. The adoption rate for
levels of cyber-security protocols at commercial airports is the focus of this research. Scope …

[PDF][PDF] Development a data mining techniques to detect and prevention cyber attack for cybersecurity

AS Ahmed, HA Salah - MJPS, 2024 - muthjps.mu.edu.iq
ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ… ABSTRAC: The identification and forecasting
of cyber-attacks is crucial process. In this article, we describe a paradigm for cyber security …

An Exploration of Machine Learning Approaches in the Field of Cybersecurity

BK Khare, I Khan - International Conference on Cryptology & Network …, 2023 - Springer
The extensive and growing utilization of the Internet and mobile apps has resulted in the
enlargement of the online realm, rendering it more vulnerable to extended and automated …

A Secured Online Voting system using Visual Cryptography and Validation

S Sable, T Ghadage, A Shelurkar… - 2023 4th International …, 2024 - ieeexplore.ieee.org
Phishing poses a substantial threat to online voting, demanding robust prevention methods.
Visual Cryptography (VC) offers promise, enhancing security and preserving voting system …

A Theoretical framework for Harnessing Machine Learning for Digital Forensics in Online Social Networks

A Wakili, S Bakkali - … Conference on Advanced Intelligent Systems for …, 2023 - Springer
Online social networks have become a popular platform for communication and information
exchange, but also a target for various cybercriminal activities. Digital forensics is essential …

A Cybersecurity Perspective of Machine Learning Algorithms

AH Seh, H Yirgaw, M Ahmad, M Faizan… - … Intelligent Security in …, 2023 - taylorfrancis.com
Cyber security ensures the real time protection of information, information systems, and
networks from intruders. It is depicted from various prominent security and privacy reports …