Homomorphic encryption: Securing sensitive data in the age of cloud computing

A Mishra - 2023 - insights2techinfo.com
Conclusion In conclusion, homomorphic encryption is a powerful tool for securing sensitive
data in the age of cloud computing. By allowing computations to be performed on encrypted …

Adaptive attention-based graph representation learning to detect phishing accounts on the Ethereum blockchain

H Sun, Z Liu, S Wang, H Wang - IEEE Transactions on Network …, 2024 - ieeexplore.ieee.org
With Ethereum blockchain advancement, the Ethereum platform gathers numerous users. In
this context, traditional phishing appears new fraud methods, resulting in significant losses …

Dynamic decision-making analysis of Netflix's decision to not provide ad-supported subscriptions

Y Zhou, S Wang, N Zhang - Technological Forecasting and Social Change, 2023 - Elsevier
Netflix is a leading digital streaming platform that provides a variety of content to users.
Netflix charges a fixed amount from its users for its services. Unlike other digital streaming …

Characteristics of understanding urls and domain names features: the detection of phishing websites with machine learning methods

I Kara, M Ok, A Ozaday - IEEE Access, 2022 - ieeexplore.ieee.org
Along with the means of communication, it has also prompted the birth of more harmful, and
challenging websites in the device of information systems, and electronics. According to …

A lightweight cross-domain authentication protocol for trusted access to industrial internet

T Zhang, Z Zhang, K Zhao, BB Gupta… - International Journal on …, 2023 - igi-global.com
This paper proposes a hierarchical framework for industrial Internet device authentication
and trusted access as well as a mechanism for industrial security state perception, and …

Exploring the intersection of athletic psychology and emerging technologies

Q Li, X Li, KT Chui, V Arya - International Journal on Semantic Web …, 2023 - igi-global.com
This paper delves into the dynamic intersection of athletic psychology and emerging
technologies, aiming to understand their interplay and implications for sports performance …

A machine learning technique for detection of social media fake news

MO Arowolo, S Misra, RO Ogundokun - International Journal on …, 2023 - igi-global.com
The emergence of the Internet and the growing development of online platforms (like
Facebook and Instagram) opened the way for disseminating information that hasn't been …

A proposed multi-level predictive WKM_ID3 algorithm, towards enhancing supply chain management in healthcare field

AE Khedr, YS Alsahafi, AM Idrees - IEEE Access, 2023 - ieeexplore.ieee.org
This research proposes a multi-level predictive algorithm based on the k-means algorithm
with multiple adaptations. The research highlights the main limitations of k-means and …

Improved Phishing Attack Detection with Machine Learning: A Comprehensive Evaluation of Classifiers and Features

S Kapan, E Sora Gunal - Applied Sciences, 2023 - mdpi.com
In phishing attack detection, machine learning-based approaches are more effective than
simple blacklisting strategies, as they can adapt to new types of attacks and do not require …

[HTML][HTML] Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost

V Vajrobol, BB Gupta, A Gaurav, HM Chuang - International Journal of …, 2024 - Elsevier
In today's world, where digital threats are on the rise, one particularly concerning threat is
the Mirai botnet. This malware is designed to infect and command a collection of Internet of …