O Alshamsi, K Shaalan, U Butt - Information, 2024 - mdpi.com
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack …
Malware analysis is essential for detecting and mitigating the effects of malicious software. This study introduces a novel hybrid approach using a combination of long short-term …
Internet of things (IoT) devices' evolution and growth have boosted system efficiency, reduced human labour, and improved operational efficiency; however, IoT devices pose …
Adversarial attacks represent a substantial threat to the security and reliability of machine learning models employed in wireless sensor networks (WSNs). This study tries to solve this …
The links between cybersecurity and civil protection in the last decades became strong due to the rapid increase in the use of Informatics Technologies (IT) worldwide and the need to …
Android is the most popular operating system of the latest mobile smart devices. With this operating system, many Android applications have been developed and become an …
The rapid integration of the Internet of Things (IoT) with ad hoc networks offers significant advantages for revolutionizing smart environments. However, ensuring trust and reliability …
Materials and Methods The research methodology involves implementing DRL techniques for autonomous car trajectory management within the context of connected and autonomous …
This research examines using MRI images for brain tumour identification in deep learning- based tumour prediction models. Four well-known deep learning architectures' accuracy …