In the evolving cyber threat landscape, one of the most visible and pernicious challenges is malware activity detection and analysis. Traditional detection and analysis methods face …
Containers are fundamental to pursue the vision of cloud-native applications and implement frameworks taking advantage of the microservice paradigm. Owing to their rapid diffusion …
A Dua, V Jindal, P Bedi - International Journal of Information Technology, 2024 - Springer
Abstract Internet Protocol version 4 (IPv4) is the most used Network Layer protocol, thus, ensuring the security aspect of this protocol is a vital concern. One such aspect includes …
Welcome to the special issue on “Intelligent Systems, ISMIS 2022 selected papers”. This issue contains extended papers from the 2022 edition of the International Symposium on …
Abstract Large Language Models (LLMs) are now a relevant part of the daily experience of many individuals. For instance, they can be used to generate text or to support working …
This chapter explores integrating deep learning-based steganography with machine learning to enhance crop disease detection and secure data transmission in smart …