Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …
computational communication systems. While security threats are changing their strategies …
An optimized fuzzy deep learning model for data classification based on NSGA-II
As a powerful paradigm, deep learning (DL) models have been used in many applications
for classification tasks in images, text, and audio. Through DL models, we can learn task …
for classification tasks in images, text, and audio. Through DL models, we can learn task …
Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things
While federated learning (FL) is a well-known privacy-preserving (PP) solution, recent
studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the …
studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the …
Analyzing xai metrics: Summary of the literature review
M Sisk, M Majlis, C Page, A Yazdinejad - Authorea Preprints, 2023 - techrxiv.org
The widespread adoption of Artificial Intelligence (AI) models by various industries in recent
years have made Explainable Artificial Intelligence (XAI) an active field of research. This …
years have made Explainable Artificial Intelligence (XAI) an active field of research. This …
Ai in software engineering: A survey on project management applications
T Crawford, S Duong, R Fueston, A Lawani… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) refers to the intelligence demonstrated by machines, and within the
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …
Generative adversarial networks for cyber threat hunting in ethereum blockchain
Ethereum blockchain has shown great potential in providing the next generation of the
decentralized platform beyond crypto payments. Recently, it has attracted researchers and …
decentralized platform beyond crypto payments. Recently, it has attracted researchers and …
A bert-based recommender system for secure blockchain-based cyber physical drug supply chain management
Abstract Drug Supply Chain Management (DSCM) can be one of the most affected streams
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …
Designing the future of coopetition: An IIoT approach for empowering SME networks
A da Silva, AJ Marques Cardoso - The International Journal of Advanced …, 2024 - Springer
In an era where Information and Communication Technologies (ICT) redefine the
boundaries of competition and collaboration, the concept of coopetition—simultaneous …
boundaries of competition and collaboration, the concept of coopetition—simultaneous …
DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge,
posing a critical risk to computer networks. Developing an effective defense mechanism …
posing a critical risk to computer networks. Developing an effective defense mechanism …
Systemization of Knowledge (SoK)-Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives
S Makar, A Dehghantanha, F Zarrinkalam… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent literature highlights a significant cross-impact between transfer learning and
cybersecurity. Many studies have been conducted on using transfer learning to enhance …
cybersecurity. Many studies have been conducted on using transfer learning to enhance …