[HTML][HTML] Leveraging AI for Network Threat Detection—A Conceptual Overview

MA Paracha, SU Jamil, K Shahzad, MA Khan… - Electronics, 2024 - mdpi.com
Network forensics is commonly used to identify and analyse evidence of any illegal or
unauthorised activity in a given network. The collected information can be used for …

Enhancing ECU identification security in CAN networks using distortion modeling and neural networks

A Hafeez, H Malik, A Irtaza, MZ Uddin… - Frontiers in Computer …, 2024 - frontiersin.org
A novel technique for electronic control unit (ECU) identification is proposed in this study to
address security vulnerabilities of the controller area network (CAN) protocol. The reliable …

Complex Proportional Assessment Based Neutrosophic Approach for Ransomware Detection in Cybersecurity IoT System.

LA Maghrabi - International Journal of Neutrosophic Science …, 2025 - search.ebscohost.com
A neutrosophic set (NS) is an advanced computational technique that accesses uncertain
information via three membership functions. A soft expert set (SES) is derived from the …

ANALISIS PRILAKU DAN DAMPAK MALWARE RANSOMWARE LOCKY METODE DINAMIS FRAMEWORK FLAREVM

SI USMAN - 2024 - repository.nusaputra.ac.id
Malware ransomware locky merupakan malware yang sangat berbahaya dan malware
berpotensi mengenkripsi semua data korban yang penting dengan imbalan tebusan …