Unleashing the power of AI: a systematic review of cutting-edge techniques in AI-enhanced scientometrics, webometrics and bibliometrics

HR Saeidnia, E Hosseini, S Abdoli, M Ausloos - Library Hi Tech, 2024 - emerald.com
Purpose The study aims to analyze the synergy of artificial intelligence (AI), with
scientometrics, webometrics and bibliometrics to unlock and to emphasize the potential of …

Trends and evolution of road user behaviour research: A bibliometric review

FS Abd Aziz, KH Abdullah, SH Harith… - International Journal of …, 2022 - ijism.isc.ac
Every single person is entitled to equal space on the roads or sidewalks, so they rely on
each other's empathy and compassion and not be self-centered. Therefore, it is essential to …

[HTML][HTML] Combining user behavioural information at the feature level to enhance continuous authentication systems

AG Martín, IM de Diego, A Fernández-Isabel… - Knowledge-Based …, 2022 - Elsevier
The scientific and business communities are proposing new authentication methods more
robust than traditional solutions relying on a single security point such as passwords (ie …

Zero trust architecture in cloud networks: application, challenges and future opportunities

S Ahmadi - Ahmadi, S.(2024). Zero Trust Architecture in Cloud …, 2024 - papers.ssrn.com
Cloud computing has become essential in this digital world as it provides opportunities and
challenges for organizations. This research explores the implementation and effectiveness …

Measuring responsible artificial intelligence (RAI) in banking: a valid and reliable instrument

J Ratzan, N Rahman - AI and Ethics, 2023 - Springer
Widespread use of artificial intelligence (AI) and machine learning (ML) in the US banking
industry raises red flags with regulators and social groups due to potential risk of data-driven …

FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments

K Gupta, D Saxena, R Gupta, J Kumar, AK Singh - Applied Soft Computing, 2024 - Elsevier
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …

User behavior analysis for detecting compromised user Accounts: A review paper

M Jurišić, I Tomičić, P Grd - Cybernetics and Information Technologies, 2023 - sciendo.com
The rise of online transactions has led to a corresponding increase in online criminal
activities. Account takeover attacks, in particular, are challenging to detect, and novel …

Threat hunting system for protecting critical infrastructures using a machine learning approach

M Aragonés Lozano, I Pérez Llopis, M Esteve Domingo - Mathematics, 2023 - mdpi.com
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for
them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) …

MAIDS: malicious agent identification-based data security model for cloud environments

K Gupta, D Saxena, R Gupta, AK Singh - Cluster Computing, 2024 - Springer
With the vigorous development of cloud computing, most organizations have shifted their
data and applications to the cloud environment for storage, computation, and sharing …

A feature-level full-reference image denoising quality assessment method based on joint sparse representation

Y Hu, B Zhang, Y Zhang, C Jiang, Z Chen - Applied Intelligence, 2022 - Springer
This paper proposes feature-level full-reference image denoising quality metrics based on a
joint sparse representation model. By decomposing a denoised image and its clean …