Comparing Risks for Binomial Reliability Assurance Test Planning

H Kim, AG Wilson - Applied Stochastic Models in Business and …, 2024 - Wiley Online Library
Balancing consumer's and producer's risk is an important consideration when planning
tests. Instead of focusing on finding a single best test plan, we introduce a general …

A Data-Driven Market Analysis and Prototype Developement of an Assistive Device

P Shrutha, S Mary, S Sarkar, T Das… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
The proposed work landscape of assistive devices available for differently-abled individuals
in India. The study encompasses a comprehensive market analysis of existing assistive …

Leveraging of Gradient Boosting Algorithm in Misuse Intrusion Detection using KDD Cup 99 Dataset

SM Sulaiman, AM Abdulazeez - Indonesian Journal of Computer Science, 2024 - 3.8.6.95
This study addresses the persistent challenge of intrusion detection as a long-term
cybersecurity issue. Investigating the efficacy of machine learning algorithms in anomaly …

Privacy Transfer Using Digital Forensic

BS Shreya, KM Akhil - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
The authority of controlling one's information that is shared, stored by others, or for any other
purposes, or the government purposes privacy will vary from the levels of risk. Digital …

Adaptive Layered Machine Learning Approach to Detect and Mitigate Behavioral Based Intrusions in Wireless Sensor Network

S Saathvika, BL Accamma, SK BJ - 2024 Control …, 2024 - ieeexplore.ieee.org
In today's dynamic cyber-security world, adjusting to emerging attack techniques
necessitates creative ways for threat detection and mitigation. Using the KDD Train dataset …

Effective Intrusion Detection and Prevention System of Botnet attack in Blockchain Technology using Recurrent Neural Network

NK Patel, N Anagha, SK BJ - 2024 Control Instrumentation …, 2024 - ieeexplore.ieee.org
Intrusion Detection and prevention System are most common in cyber security. The aim of
this undertaking is to delve into blockchain security and specifically apply machine learning …

Deep Neural Network Approach on Phishing Websites Detection, Identification and Proactive Prevention

K Soundarya, HS Siddaraju… - 2024 8th …, 2024 - ieeexplore.ieee.org
Phishing is a prevalent type of cyberattack that involves posing as a trustworthy source in an
email message to fraudulently attempt to get personal information such as usernames …