-
1
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
2
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
3
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
4
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
5
A survey on intrusion detection system in IoT networks
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article