[HTML][HTML] Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification

AK Al Hwaitat, HN Fakhouri - Applied Sciences, 2024 - mdpi.com
The increasing sophistication and frequency of cyber threats necessitate the development of
advanced techniques for detecting and mitigating attacks. This paper introduces a novel …

Risk Management and Cybersecurity in Transportation and Warehousing

A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …

Quality of interaction-based predictive model for support of online learning in pandemic situations

F Mumtaz, AI Jehangiri, W Ishaq, Z Ahmad… - … and Information Systems, 2024 - Springer
Higher education institutions place a lot of importance on their electronic learning systems.
Educational institutions in Pakistan and other countries have adopted learning management …

A novel framework for credit card fraud detection

A Mniai, M Tarik, K Jebari - IEEE Access, 2023 - ieeexplore.ieee.org
Credit card transactions have grown considerably in the last few years. However, this
increase has led to significant financial losses around the world. More than that, processing …

[PDF][PDF] Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification

R Udayakumar, A Joshi, SS Boomiga… - Journal of Internet …, 2023 - jisis.org
Given the growing dependence on digital systems and the escalation of financial fraud
occurrences, it is imperative to implement efficient cyber security protocols and fraud …

Emerging Trends in Cybersecurity Challenges with Reference to Pen Testing Tools in Society 5.0

G Kaur, N Bharathiraja, KD Singh… - … and Society 5.0, 2024 - taylorfrancis.com
Due to enormous dependence on digital technology, many companies across the globe are
facing trouble with cyber-assaults and cyber threats. The main motive of cyber-assaults and …

Securing IoT Devices Using Generative AI Techniques

A Khan, N Jhanjhi, GAA Abdulhabeb… - … With Generative AI …, 2025 - igi-global.com
Generative artificial intelligence (GenAI) is a part of artificial intelligence which has the ability
to generate content in various formats ranging from text to videos and images to audio …

Cyber Security Architecture for Safe Data Storage and Retrieval for Smart City Applications

R Tyagi, S Bagchi, G Kaur, N Sharma… - 2023 International …, 2023 - ieeexplore.ieee.org
The term “Smart City” refers to incentives for the development that combines “Purely digital
Connected City” and municipal government with the aid of ICT. By highlighting the …

Machine Learning Methods for Cybersecurity: Review and Bibliometric Analysis

E Kail, A Banati, R Fleiner, A Mosavi… - 2023 IEEE 21st Jubilee …, 2023 - ieeexplore.ieee.org
This article presents a bibliometric analysis and review of the applications of machine
learning methods in cybersecurity. A taxonomy of the methods and applications is …

A Robust and Efficient Machine Learning Approach for Identifying Fraud in Credit Card Transaction

H Rathore, R Ratnawat - 2024 5th International Conference on …, 2024 - ieeexplore.ieee.org
The rise in credit card fraud in this age of technological advancements calls for the creation
of trustworthy and efficient detection systems. This work investigates how to enhance credit …