A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024 - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

[PDF][PDF] Cross project software defect prediction using machine learning: a review

MS Saeed, M Saleem - International Journal of Computational …, 2023 - researchgate.net
Software defect prediction is a crucial area of study focused on enhancing software quality
and cutting down on software upkeep expenses. Cross Project Defect Prediction (CPDP) is …

A gene selection algorithm for microarray cancer classification using an improved particle swarm optimization

AA Nagra, AH Khan, M Abubakar, M Faheem… - Scientific Reports, 2024 - nature.com
Gene selection is an essential step for the classification of microarray cancer data. Gene
expression cancer data (deoxyribonucleic acid microarray] facilitates in computing the …

Machine learning based dynamic resource sharing and frequency reuse in 5G HetNets with dronecells

M Yağcıoğlu - Computer Networks, 2025 - Elsevier
As 5G mobile communication systems evolve to meet the growing demands for network
capacity and coverage, innovative solutions are required to address challenges such as …

Predictive Analytics and Machine Learning for Electricity Consumption Resilience in Wholesale Power Markets

JI Janjua, A Sabir, T Abbas, SQ Abbas… - … Conference on Cyber …, 2024 - ieeexplore.ieee.org
This article presents the research results on creating prediction models using historical data
on projected power usage in an area with many sectors. Given the constantly high energy …

The Synergy of Artificial Intelligence and Cybersecurity

A Ali, S Ahmed, M Hussain, TA Bhutta… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
As the menace of cyber threats intensifies, artificial intelligence emerges as a crucial tool for
enhancing cybersecurity. This article delves into the advantages and drawbacks of AI in …

Ransomware Attacks: Tools and Techniques for Detection

K Khaliq, NZ Ab Rahim, K Hamid… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …

Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies

A Ali, A Zia, A Razzaque, H Shahid… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
This paper reviews the role of artificial neural networks (ANNs) in enhancing cybersecurity
measures. It delves into research methodologies employed to detect security breaches …

Identification of the Diabetic Retinopathy Using ResNet-18

F Ahmed, A Fatima, M Mamoon… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
In the realm of healthcare, trauma, aging, and diseases like diabetes can cause a variety of
abnormalities in human eyes. Diabetic retinopathy stands out as a prevalent global cause of …

AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning

A Ali, A Razzaque, U Munir, H Shahid… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Computer Security is constantly evolving and dynamic; today, applying Artificial Intelligence
techniques becomes indispensable in treating and detecting threats to which organizations …