Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat

A Fatima, TA Khan, TM Abdellatif… - … for Technology and …, 2023 - ieeexplore.ieee.org
The primary goal of this research article is to identify prevalent network dangers and provide
countermeasures to these threats. In this modern era, everyone has access to the internet …

DDoS Intrusion Detection with Ensemble Stream Mining for IoT Smart Sensing Devices

TM Ghazal, NA Al-Dmour, RA Said, A Omidvar… - The Effect of Information …, 2023 - Springer
Security threats in the Smart City Systems are becoming a challenge. These Smart City
Systems, generating Big Data, are a revolutionizing application of the Internet of Things …

Nosql: Future of bigdata analytics characteristics and comparison with rdbms

M Arshad, MN Brohi, TR Soomro, TM Ghazal… - The Effect of Information …, 2023 - Springer
The growth of digital world has become so fast and the data volume turned to more
composite in relations to size from terabyte and higher, the variation of data including …

Systematic Review: Predictive Models for the Winning Team of Super Leagues (SL)

S Muneer, MB Alvi, M Al Sakhnani… - … for Technology and …, 2023 - ieeexplore.ieee.org
The Pakistan Super League (PSL) is one of the most popular cricket leagues in the world,
attracting millions of fans and spectators each year. With the 2023 edition of the league just …

An Early Diagnosis of Brain Tumor Using Fused Transfer Learning

G Sajjad, MBS Khan, TM Ghazal… - … for Technology and …, 2023 - ieeexplore.ieee.org
This study aims to develop a system that can classify brain tumors as either benign or
malignant. The dataset used in this study consists of 253 MRI images of the brain. To …

K-DGHC: A hierarchical clustering method based on K-dominance granularity

B Yu, Z Zheng, J Dai - Information Sciences, 2023 - Elsevier
Existing hierarchical clustering (HC) algorithms generally depend on the Euclidean
characteristic metric (Euclidean distance, Manhattan distance, Chebyshev distance, etc.) on …

Research Challenges and Future Facet Of Cellular Computing

SEA Alnawayseh, TA Khan, U Farooq… - … for Technology and …, 2023 - ieeexplore.ieee.org
cellular computing is promising and exciting domain. As the field continues to evolve,
several future facets are expected to emerge. One potential facet is the development of more …

An Automated Platform for Gathering and Managing Open-Source Cyber Threat Intelligence

NA Al-Dmour, MK Hasan, M Ajmal, M Ali… - … for Technology and …, 2023 - ieeexplore.ieee.org
The community has begun paying more attention to source OSCTI Cyber Threat Intelligence
to stay informed about the rapidly changing cyber threat landscape. Numerous reports from …

A comprehensive review on big data challenges

S Bharany, N Taleb, MT Sadiq… - … for Technology and …, 2023 - ieeexplore.ieee.org
Increased hardware capability has allowed many businesses to store massive amounts of
data in the previous few years. Streams of data may go on forever, so they are used in so …

A Review on the need of Clustering Techniques Used for Wireless Sensor Networks

S Bharany, AU Rehman, MT Sadiq… - … for Technology and …, 2023 - ieeexplore.ieee.org
Wireless sensor networks have been implemented in various software to help gather and
analyze data from the physical world. Wireless sensor networks are networks of multiple tiny …