A concise review of MRI feature extraction and classification with kernel functions

J Singh, C Arya, N Yamsani, M Kumar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Magnetic resonance imaging is a common medical imaging tool for the identification and
monitoring of brain diseases. Accurate classification of MRI brain pictures is extremely …

[HTML][HTML] Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach

O Alshamsi, K Shaalan, U Butt - Information, 2024 - mdpi.com
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of
interconnected gadgets in smart households, thus exposing them to new cyber-attack …

Hybrid deep learning approach based on lstm and cnn for malware detection

P Thakur, V Kansal, V Rishiwal - Wireless Personal Communications, 2024 - Springer
Malware analysis is essential for detecting and mitigating the effects of malicious software.
This study introduces a novel hybrid approach using a combination of long short-term …

DBoTPM: A deep neural network-based botnet prediction model

MA Haq - Electronics, 2023 - mdpi.com
Internet of things (IoT) devices' evolution and growth have boosted system efficiency,
reduced human labour, and improved operational efficiency; however, IoT devices pose …

Towards Resilient Machine Learning Models: Addressing Adversarial Attacks in Wireless Sensor Network

MA Shihab, HA Marhoon, SR Ahmed… - Journal of Robotics …, 2024 - journal.umy.ac.id
Adversarial attacks represent a substantial threat to the security and reliability of machine
learning models employed in wireless sensor networks (WSNs). This study tries to solve this …

Relationship between Cyber Security and Civil Protection in the Greek Reality

S Kalogiannidis, M Paschalidou, D Kalfas… - Applied Sciences, 2023 - mdpi.com
The links between cybersecurity and civil protection in the last decades became strong due
to the rapid increase in the use of Informatics Technologies (IT) worldwide and the need to …

AMDDLmodel: Android smartphones malware detection using deep learning model

M Aamir, MW Iqbal, M Nosheen, MU Ashraf, A Shaf… - Plos one, 2024 - journals.plos.org
Android is the most popular operating system of the latest mobile smart devices. With this
operating system, many Android applications have been developed and become an …

Verifying trust over IoT-ad hoc network-based applications under uncertainty

N Baharloo, J Bentahar, G Alwhishi, N Drawel… - Ad Hoc Networks, 2024 - Elsevier
The rapid integration of the Internet of Things (IoT) with ad hoc networks offers significant
advantages for revolutionizing smart environments. However, ensuring trust and reliability …

[HTML][HTML] Navigating the Future of Secure and Efficient Intelligent Transportation Systems using AI and Blockchain

JG Bijalwan, J Singh, V Ravi… - The Open …, 2024 - opentransportationjournal.com
Materials and Methods The research methodology involves implementing DRL techniques
for autonomous car trajectory management within the context of connected and autonomous …

Comparative analysis of deep learning-based brain tumor prediction models using MRI scan

SMP Gangadharan, M Dharani… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This research examines using MRI images for brain tumour identification in deep learning-
based tumour prediction models. Four well-known deep learning architectures' accuracy …