[HTML][HTML] Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Smart manufacturing systems: state of the art and future trends

YJ Qu, XG Ming, ZW Liu, XY Zhang, ZT Hou - The International Journal of …, 2019 - Springer
With the development and application of advanced technologies such as Cyber Physical
System, Internet of Things, Industrial Internet of Things, Artificial Intelligence, Big Data, Cloud …

Evolving fuzzy and neuro-fuzzy approaches in clustering, regression, identification, and classification: A survey

I Škrjanc, JA Iglesias, A Sanchis, D Leite, E Lughofer… - Information …, 2019 - Elsevier
Major assumptions in computational intelligence and machine learning consist of the
availability of a historical dataset for model development, and that the resulting model will, to …

Designing ECG monitoring healthcare system with federated transfer learning and explainable AI

A Raza, KP Tran, L Koehl, S Li - Knowledge-Based Systems, 2022 - Elsevier
Deep learning plays a vital role in classifying different arrhythmias using
electrocardiography (ECG) data. Nevertheless, training deep learning models normally …

Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …

Discussion and review on evolving data streams and concept drift adapting

I Khamassi, M Sayed-Mouchaweh, M Hammami… - Evolving systems, 2018 - Springer
Recent advances in computational intelligent systems have focused on addressing complex
problems related to the dynamicity of the environments. In increasing number of real world …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

The use of unmanned aerial vehicles and wireless sensor networks for spraying pesticides

BS Faiçal, FG Costa, G Pessin, J Ueyama… - Journal of Systems …, 2014 - Elsevier
The application of pesticides and fertilizers in agricultural areas is of crucial importance for
crop yields. The use of aircrafts is becoming increasingly common in carrying out this task …

Performance Benchmarking and Analysis of Prognostic Methods for CMAPSS Datasets.

E Ramasso, A Saxena - International Journal of Prognostics and Health …, 2014 - hal.science
Six years and more than seventy publications later this paper looks back and analyzes the
development of prognostic algorithms using C-MAPSS datasets generated and …

Extracting biological information with computational analysis of Fourier-transform infrared (FTIR) biospectroscopy datasets: current practices to future perspectives

J Trevisan, PP Angelov, PL Carmichael, AD Scott… - Analyst, 2012 - pubs.rsc.org
Applying Fourier-transform infrared (FTIR) spectroscopy (or related technologies such as
Raman spectroscopy) to biological questions (defined as biospectroscopy) is relatively …