Impact and research challenges of penetrating testing and vulnerability assessment on network threat

A Fatima, TA Khan, TM Abdellatif… - … for Technology and …, 2023 - ieeexplore.ieee.org
The primary goal of this research article is to identify prevalent network dangers and provide
countermeasures to these threats. In this modern era, everyone has access to the internet …

Improving pneumonia detection in chest X-rays using transfer learning approach (AlexNet) and adversarial training

A Athar, RN Asif, M Saleem, S Munir… - … for Technology and …, 2023 - ieeexplore.ieee.org
The method outlined in this paper employs transfer learning and adversarial training to
enhance the precision of pneumonia identification in chest X-rays. The authors use the …

Systematic Review: Predictive Models for the Winning Team of Super Leagues (SL)

S Muneer, MB Alvi, M Al Sakhnani… - … for Technology and …, 2023 - ieeexplore.ieee.org
The Pakistan Super League (PSL) is one of the most popular cricket leagues in the world,
attracting millions of fans and spectators each year. With the 2023 edition of the league just …

A new adaptive trust and reputation model for mobile agent systems

D Shehada, CY Yeun, MJ Zemerly, M Al-Qutayri… - Journal of Network and …, 2018 - Elsevier
Mobile agents (MAs) are being widely used in distributed applications development. The
motivation behind the interest in MAs is derived from the various advantages they offer, such …

TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications

F Alqahtani, Z Al-Makhadmeh, A Tolba… - Computer Communications, 2020 - Elsevier
Securing communications and information sharing within the Internet of Things (IoT)
paradigm is challenging because of the increase in the size and mobility of the user …

[HTML][HTML] Fog-based distributed trust and reputation management system for internet of things

D Shehada, A Gawanmeh, CY Yeun… - Journal of King Saud …, 2022 - Elsevier
Internet of things (IoT) provides connectivity between different smart devices. IoT systems
aim to make data collection, and processing easier. Studies show that we can expect over …

The effect of artificial intelligence on cybersecurity

A Ali, MA Khan, K Farid, SS Akbar… - … for Technology and …, 2023 - ieeexplore.ieee.org
Cyber-attacks present a greater threat to individuals and the security of the modern state in
the globalized world. Artificial intelligence offers several tools that can be used to improve …

The Application of HCI in Industry and IT

TM Ghazal, MK Hasan, HM Alzoubi… - … and Statistics (MACS …, 2022 - ieeexplore.ieee.org
The HCI in the industry, and IT has increased the feasibility of data exchange. Multiple
transactions are carried out online, which has led to overwhelming increasing shopping …

Heart disease prediction using machine learning

S Bilgaiyan, TI Ayon, AA Khan… - 2023 International …, 2023 - ieeexplore.ieee.org
Mainly related to the cardiovascular system, brain, kidney, and peripheral arteries, the
disease is called heart disease. Heart disease can have many causes, but high blood …

Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance-A Survey

R Joseph, R Sharma, MI Sarwar, I Khan… - … for Technology and …, 2023 - ieeexplore.ieee.org
Accounting practices are based on their underlying accounting principles, and currently, the
Double-Entry Accounting (DEA) is used in both manual and computer-based Accounting …