Robust malicious software detection and classification using global whale optimization algorithm with deep learning approach

M Assiri - Scientific Reports, 2024 - nature.com
Software malware detection and classification leverage sophisticated procedures and
methods from the cybersecurity domain for identifying and categorizing malicious software …

[PDF][PDF] STEM Education, Artificial Intelligence, and Ethical Challenges

N Mirea, M Palade, A Gaureanu - Development, 2024 - researchgate.net
This article delves into the intersection of artificial intelligence (AI), science, technology,
engineering, and mathematics (STEM) education, and ethics, highlighting their role in the …

Optimistic Boosting Internet Connection Throughput by Incorporating Blockchain Filters into Network Infrastructure

CA Bhuvaneswari, N Garg, BR Supreeth… - … and Smart Electrical …, 2023 - ieeexplore.ieee.org
This study examines how blockchain filters might modify network architecture to boost
internet speed. This novel strategy may address the growing need for faster, more reliable …

Next-Generation Firewall Open-Source and LAN Performance

G Olivera-Ruiz, J Solsol-Isminio… - … Conference of the …, 2024 - ieeexplore.ieee.org
The use of Information Technologies in organizations is essential to optimize processes and
guarantee data security. Firewalls, being a fundamental piece in the protection of corporate …

Guardian Box through Honeypot Using Shielded Socket for Linux Distribution

G Maheswari, A Auroshaa, AS Das… - … on Advances in Data …, 2024 - ieeexplore.ieee.org
The goal of the project is to focus on the network security when connecting to a public router
to access the internet. The particular platform which is focused for this project is Debian 11 a …

Software security: Threats, solutions and challenges

H Mittal - Computer Software and Media …, 2024 - systems.enpress-publisher.com
Software security is of great concern as computers have entered almost all walks of life and
people at large have become dependent on technology for not only entertainment and …

Data Mining-Driven Framework for Effective Firewall Log Management

AM Gouda, K Emara, MH Khafagy… - … : Fayoum Journal of …, 2024 - lfjsis.journals.ekb.eg
firewall devices faces challenges, particularly in addressing performance issues due to
evolving security threats. This paper presents a framework utilizing data mining techniques …