Belt and road initiative (BRI) supply chain risks: propositions and model development

J Ram, Z Zhang - The International Journal of Logistics Management, 2020 - emerald.com
Purpose Belt and road initiative (BRI) is a transcontinental endeavor strategically connecting
supply chains (SCs) and economic infrastructures to ignite business activities and achieve …

Modelling the relationships between the barriers to implementing machine learning for accident analysis: the Indian petroleum industry

RK Gangadhari, V Khanzode, S Murthy… - … An International Journal, 2023 - emerald.com
Purpose This paper aims to identify, prioritise and explore the relationships between the
various barriers that are hindering the machine learning (ML) adaptation for analysing …

Research pattern of internet of things and its impact on cyber security

V Gautam, RG Tiwari, AK Jain… - 2022 11th International …, 2022 - ieeexplore.ieee.org
The world is experiencing a great advancement in technology which gives us the relief of
accessing any kind of service in any corner of the world. Human beings being social animals …

Anomaly detection using machine learning with a case study

GR Jidiga, P Sammulal - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
The traditional security mechanisms are not stable in the present usage of corporate
applications due to the frequent change in anomaly definitions and lack of control on …

Vulnerability Analysis of Critical Resources Using Machine Learning

S Karthika - International Conference on Computer & …, 2023 - Springer
Lack of cyber awareness among working professionals, especially in the IT field, has
resulted in negative actors taking advantage of poorly built/configured critical resources …

Impact of Hybrid Mesh Firewalls on Intrusion Detection and Prevention Systems (IDPS)

S Martin, L Dupont - Innovative Computer Sciences …, 2024 - innovatesci-publishers.com
As cyber threats evolve, the effectiveness of network security mechanisms such as firewalls
and Intrusion Detection and Prevention Systems (IDPS) becomes crucial. This paper …

Integration of Human-Centric Approaches with AI in Cyber Threat Intelligence

A Ali, F Khan - Innovative Computer Sciences Journal, 2024 - innovatesci-publishers.com
The rapid evolution of cyber threats necessitates advanced and adaptive methods for threat
intelligence. Integrating human-centric approaches with Artificial Intelligence (AI) in Cyber …

Comparative Analysis of Hybrid Ensemble Methods in Cybersecurity: Integration of Genetic Algorithms and Decision Trees for Intrusion Detection

J Muzaffar, A Mustafa - Innovative Computer Sciences …, 2024 - innovatesci-publishers.com
Cybersecurity remains a critical concern in the digital age, with intrusion detection being a
pivotal area of research. Conventional methods frequently face challenges in keeping pace …

Financial Fraud Detection with a Modified Quantum Vortex Search Algorithm for Enhanced CNN-based Classification

C Lee - Innovative Computer Sciences Journal, 2024 - innovatesci-publishers.com
Financial fraud detection is a critical challenge in the banking and financial sectors, where
traditional methods often struggle to keep pace with evolving fraud tactics. This paper …

Integrating Bi-Directional LSTM and Swarm Intelligence for Dynamic Cyber Threat Prediction

R Fernandez - Innovative Computer Sciences Journal, 2024 - innovatesci-publishers.com
Cyber threat prediction is a critical area in cybersecurity where timely and accurate
identification of threats can prevent significant damages. This paper proposes a novel …