[PDF][PDF] AMathematicalProposed Model for Public Key Encryption Algorithm in Cybersecurity

HA Saif, GMI Gharib… - Advances in …, 2021 - research-publication.com
Information security is a very important science, especially after the continuous increase in
cybercrime of all kinds, which caused very large financial, economic and political losses, so …

Meme kanseri tahmininde makine öğrenmesi algoritmaları ve AutoML

A Karakaya - 2024 - gcris.pau.edu.tr
Makine öğrenmesi tıp dahil olmak üzere birçok alanda önemli rol oynamaktadır. Özellikle
sağlık alanında makine öğrenmesi çeşitli hastalıkların teşhis ve tedavisine yardımcı olan …

Machine Learning for Classification of DOS Attack in Smart Healthcare Networks

S Dargad, P Thakkar, S Giri - International Conference on Computing …, 2022 - Springer
Healthcare industry has taken 360-degree change when it comes to managing, analyzing
and leveraging healthcare data. With 5G technology increased data rates, more reliability …

Cyber Threat Detection Using Machine Learning

FW Gaddah, SF El-Geder - … of the Conference on Sciences and …, 2024 - ieeexplore.ieee.org
In this paper, we have designed and implemented a solution for the detection of cyber
threats using supervised machine learning (ML). An effective software program was adapted …

[PDF][PDF] Fast and Minimax Optimal Estimation of Low-Rank Matrices via Non-Convex Gradient Descent.

G Zhang, HM Chiu, RY Zhang - arXiv preprint arXiv:2305.17224, 2023 - researchgate.net
We study the problem of estimating a low-rank matrix from noisy measurements, with the
specific goal of achieving minimax optimal error. In practice, the problem is commonly …

Detection of network anomalies in log files using machine learning methods

VA Skazin, AV Pavlychev, SS Zotov - IOP Conference Series …, 2021 - iopscience.iop.org
Detection of network anomalies plays an important role in ensuring information security and
countering unauthorized access to information infrastructure, including critical facilities …

CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience

R Alguliyev, B Nabiyev… - 2023 5th International …, 2023 - ieeexplore.ieee.org
The significant growth in the number, variety, and sophistication of cyber threats in recent
years makes traditional approaches ineffective against new generation cyber threats. More …

and Year

PP Ray - Integration of IoT with Cloud Computing for Smart …, 2023 - books.google.com
Agriculture or farming is the most ancient and remarkable occupation in the whole world. But
people involved in this field are facing difficulty controlling threats because of diseases and …

Detecting DDoS attack: a machine-learning-based approach

G Megala, S Prabu… - Applications of Artificial …, 2021 - igi-global.com
The major network security problems faced by many internet users is the DDoS (distributed
denial of service) attack. This attack makes the service inaccessible by exhausting the …

Electrical spiking activity of proteinoids-ZnO colloids

P Mougkogiannis, NR Kheirabadi… - Neuromorphic …, 2024 - iopscience.iop.org
We are studying the remarkable electrical properties of Proteinoids-ZnO microspheres with
the aim of exploring their potential for a new form of computing. Our research has revealed …