Challenges, tasks, and opportunities in modeling agent-based complex systems

L An, V Grimm, A Sullivan, BL Turner Ii, N Malleson… - Ecological …, 2021 - Elsevier
Humanity is facing many grand challenges at unprecedented rates, nearly everywhere, and
at all levels. Yet virtually all these challenges can be traced back to the decision and …

Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …

Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey

G Nguyen, S Dlugolinsky, M Bobák, V Tran… - Artificial Intelligence …, 2019 - Springer
The combined impact of new computing resources and techniques with an increasing
avalanche of large datasets, is transforming many research areas and may lead to …

An ensemble approach based on fuzzy logic using machine learning classifiers for android malware detection

İ Atacak - Applied Sciences, 2023 - mdpi.com
In this study, a fuzzy logic-based dynamic ensemble (FL-BDE) model was proposed to
detect malware exposed to the Android operating system. The FL-BDE model contains a …

Deep learning for proactive network monitoring and security protection

G Nguyen, S Dlugolinsky, V Tran, AL Garcia - ieee Access, 2020 - ieeexplore.ieee.org
The work presented in this paper deals with a proactive network monitoring for security and
protection of computing infrastructures. We provide an exploitation of an intelligent module …

[图书][B] Machine learning: theory to applications

SL Mirtaheri, R Shahbazian - 2022 - taylorfrancis.com
The book reviews core concepts of machine learning (ML) while focusing on modern
applications. It is aimed at those who want to advance their understanding of ML by …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

Hybridization of galactic swarm and evolution whale optimization for global search problem

BM Nguyen, T Tran, T Nguyen, G Nguyen - IEEE Access, 2020 - ieeexplore.ieee.org
The works presented in this paper addresses the robust population-based global
optimization that is influenced by the simplicity and efficiency principles introduced in two …

Efficient time-series forecasting using neural network and opposition-based coral reefs optimization

T Nguyen, T Nguyen, BM Nguyen… - International Journal of …, 2019 - Springer
In this paper, a novel algorithm called opposition-based coral reefs optimization (OCRO) is
introduced. The algorithm is built as an improvement for coral reefs optimization (CRO) …

A systematic overview of the machine learning methods for mobile malware detection

Y Kim, JJ Lee, MH Go, HY Kang… - Security and …, 2022 - Wiley Online Library
With the deployment of the 5G cellular system, the upsurge of diverse mobile applications
and devices has increased the potential challenges and threats posed to users. Industry and …