[HTML][HTML] Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
AK Al Hwaitat, HN Fakhouri - Applied Sciences, 2024 - mdpi.com
The increasing sophistication and frequency of cyber threats necessitate the development of
advanced techniques for detecting and mitigating attacks. This paper introduces a novel …
advanced techniques for detecting and mitigating attacks. This paper introduces a novel …
Risk Management and Cybersecurity in Transportation and Warehousing
A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …
continuous uninterrupted functioning is of paramount significance for the enterprises …
Quality of interaction-based predictive model for support of online learning in pandemic situations
F Mumtaz, AI Jehangiri, W Ishaq, Z Ahmad… - … and Information Systems, 2024 - Springer
Higher education institutions place a lot of importance on their electronic learning systems.
Educational institutions in Pakistan and other countries have adopted learning management …
Educational institutions in Pakistan and other countries have adopted learning management …
A novel framework for credit card fraud detection
A Mniai, M Tarik, K Jebari - IEEE Access, 2023 - ieeexplore.ieee.org
Credit card transactions have grown considerably in the last few years. However, this
increase has led to significant financial losses around the world. More than that, processing …
increase has led to significant financial losses around the world. More than that, processing …
[PDF][PDF] Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification
R Udayakumar, A Joshi, SS Boomiga… - Journal of Internet …, 2023 - jisis.org
Given the growing dependence on digital systems and the escalation of financial fraud
occurrences, it is imperative to implement efficient cyber security protocols and fraud …
occurrences, it is imperative to implement efficient cyber security protocols and fraud …
Emerging Trends in Cybersecurity Challenges with Reference to Pen Testing Tools in Society 5.0
Due to enormous dependence on digital technology, many companies across the globe are
facing trouble with cyber-assaults and cyber threats. The main motive of cyber-assaults and …
facing trouble with cyber-assaults and cyber threats. The main motive of cyber-assaults and …
Securing IoT Devices Using Generative AI Techniques
Generative artificial intelligence (GenAI) is a part of artificial intelligence which has the ability
to generate content in various formats ranging from text to videos and images to audio …
to generate content in various formats ranging from text to videos and images to audio …
Cyber Security Architecture for Safe Data Storage and Retrieval for Smart City Applications
The term “Smart City” refers to incentives for the development that combines “Purely digital
Connected City” and municipal government with the aid of ICT. By highlighting the …
Connected City” and municipal government with the aid of ICT. By highlighting the …
Machine Learning Methods for Cybersecurity: Review and Bibliometric Analysis
This article presents a bibliometric analysis and review of the applications of machine
learning methods in cybersecurity. A taxonomy of the methods and applications is …
learning methods in cybersecurity. A taxonomy of the methods and applications is …
A Robust and Efficient Machine Learning Approach for Identifying Fraud in Credit Card Transaction
H Rathore, R Ratnawat - 2024 5th International Conference on …, 2024 - ieeexplore.ieee.org
The rise in credit card fraud in this age of technological advancements calls for the creation
of trustworthy and efficient detection systems. This work investigates how to enhance credit …
of trustworthy and efficient detection systems. This work investigates how to enhance credit …