Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and …
Cloud computing is perhaps the most enticing innovation in the present figuring situation. It gives an expense-effective arrangement by diminishing the enormous forthright expense of …
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
In today's cyberattacks, botnets are used as an advanced technique to generate sophisticated and coordinated attacks. Infected systems connect to a command and control …
A Zaheer, S Tahir, MF Almufareh… - … Conference on Business …, 2023 - ieeexplore.ieee.org
Botnet attacks are becoming a growing threat to the security of computer networks, and there is a need for effective and efficient methods for detecting these attacks. In this study, we …
TC Tran, TK Dang - 2022 16th International Conference on …, 2022 - ieeexplore.ieee.org
The number of Internet of Things (IoT) devices connected to the network enlarges dramatically these days. This leads to rising cyberattacks, such as botnets. These attacks …
Courtesy amount recognition from bank checks is an important application of pattern recognition. Although much progress has been made on isolated digit recognition for Indian …
S Tahir, A Zaheer - Cybersecurity Measures for Logistics Industry …, 2024 - igi-global.com
Anomaly detection in IoT-based sleep patterns is crucial for early identification of health issues. This chapter presents a distributed model using federated learning for privacy and …
W Zhang, W Chen, Z Zhang, F Zhang… - Available at SSRN …, 2022 - papers.ssrn.com
As an important network service, domain name system (DNS) is abused by attackers. Malicious domain name detection has become an important task to combat network crime …