Cybersecurity threats and their mitigation approaches using Machine Learning—A Review
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …
machine learning in cybersecurity is to make the process of malware detection more …
Machine learning and deep learning approaches in IoT
A Javed, M Awais, M Shoaib, KS Khurshid… - PeerJ Computer …, 2023 - peerj.com
The internet is a booming sector for exchanging information because of all the gadgets in
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …
Usage of Saliency Prior Maps for Detection of Salient Object Features
VS Rao, V Mounika, NR Sai… - … on I-SMAC (IoT in Social …, 2021 - ieeexplore.ieee.org
Current headway on significant article identification is broad, progressing for the most part
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …
Using DWT-DCT-SVD watermarking for securing medical images
Telemedicine is an advanced digital application in which a huge volume of clinical
information must be transmitted safely and productively throughout the business. The …
information must be transmitted safely and productively throughout the business. The …
Interest flooding attack detection method in NDN networks
To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper
proposes a discovery technique for interest flooding assault dependent on chi-square test …
proposes a discovery technique for interest flooding assault dependent on chi-square test …
Analyses of 6G-Network and Blockchain-Network Application Security: Future Research Prospect
AH Annas, AA Zainuddin, AW Ramlee… - … on Perceptive and …, 2024 - journals.iium.edu.my
The evolution from 5G to 6G signifies a monumental progression in wireless communication
technology, promising enhanced capabilities and broader applications. Building on the …
technology, promising enhanced capabilities and broader applications. Building on the …
[PDF][PDF] Face recognition attendance system using hog algorithm
D Prasad, C Sirisha, GL Tanuja… - Dogo Rangsang …, 2023 - journal-dogorangsang.in
Face recognition is the effective technique in this real world application. Human face
recognition is useful for the verification purposes mainly in the student attendance system …
recognition is useful for the verification purposes mainly in the student attendance system …
Surveying Machine Learning in Cyberattack Datasets: A Comprehensive Analysis
AF Al-zubidi, AK Farhan… - Journal of Soft …, 2024 - jscca.uotechnology.edu.iq
Cyberattacks have become one of the most significant security threats that have emerged in
the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various …
the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various …
Identification of Network Data security inside the IOT by using Deep learning approach
With an expanding number of organizations related with the web, including circulated
figuring systems and the Internet of Things (IoT), the reaction to cyberattacks has become …
figuring systems and the Internet of Things (IoT), the reaction to cyberattacks has become …
[PDF][PDF] AN APPROACH TO SECURED CLOUD DATA STORAGE WITH INDUSTRIAL IOT
Cloud computing is the enormous stockpiling region where assets are accessible from
wherever to everybody as administration. Distributed computing is the use of various …
wherever to everybody as administration. Distributed computing is the use of various …