Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review
The 21st century has seen rapid changes in technology, industry, and social patterns. Most
industries have moved towards automation, and human intervention has decreased, which …
industries have moved towards automation, and human intervention has decreased, which …
Email Security Issues, Tools, and Techniques Used in Investigation
E Altulaihan, A Alismail, MM Hafizur Rahman… - Sustainability, 2023 - mdpi.com
The email system is a globally distributed communication infrastructure service that involves
multiple actors playing different roles to ensure end-to-end mail delivery. It is an …
multiple actors playing different roles to ensure end-to-end mail delivery. It is an …
Secure routing for LEO satellite network survivability
Secure routing algorithm plays an important role in the performance of LEO satellite network
survivability. However, due to the instability, openness and exposure of inter-satellite links …
survivability. However, due to the instability, openness and exposure of inter-satellite links …
Multimodal religiously hateful social media memes classification based on textual and image data
Multimodal hateful social media meme detection is an important and challenging problem in
the vision-language domain. Recent studies show high accuracy for such multimodal tasks …
the vision-language domain. Recent studies show high accuracy for such multimodal tasks …
An efficient approach for textual data classification using deep learning
A Alqahtani, H Ullah Khan, S Alsubai, M Sha… - Frontiers in …, 2022 - frontiersin.org
Text categorization is an effective activity that can be accomplished using a variety of
classification algorithms. In machine learning, the classifier is built by learning the features of …
classification algorithms. In machine learning, the classifier is built by learning the features of …
Find: privacy-enhanced federated learning for intelligent fake news detection
The development and popularity of social networks have made information dissemination
unprecedentedly convenient and speedy. However, the spread of fake news can often …
unprecedentedly convenient and speedy. However, the spread of fake news can often …
SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework
DP Joseph, P Viswanathan - IEEE Access, 2023 - ieeexplore.ieee.org
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword
search, frequent hashes, frequent paths, and frequent size methods. These methods are …
search, frequent hashes, frequent paths, and frequent size methods. These methods are …
Flex-CC: A flexible connected chains scheme for multicast source authentication in dynamic SDN environment
H Eltaief - Computer Networks, 2022 - Elsevier
Multicast service has the advantage of saving the resources of senders. It ensures the
efficiency of the network by lowering network share, but it is necessary to address security …
efficiency of the network by lowering network share, but it is necessary to address security …
Automatic forensic analysis of criminal navigation system using machine learning
There are many crime situations witnessed in everyday life nowadays, and they are
expanding at an alarming rate. We've been building an APP to assist police investigators …
expanding at an alarming rate. We've been building an APP to assist police investigators …
[HTML][HTML] Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
J Adkins, A Al Bataineh, M Khalaf - Future Internet, 2024 - mdpi.com
The field of digital forensics relies on expertise from multiple domains, including computer
science, criminology, and law. It also relies on different toolsets and an analyst's expertise to …
science, criminology, and law. It also relies on different toolsets and an analyst's expertise to …