-
161
An adaptive neuro-fuzzy inference system for multinomial malware classification
Published 2025-02-01“…The ANFIS model was trained and tested with two prominent malware datasets from the Canada Institute of Cyber Security. The experimental results showed that the performance of the ANFIS model degrades as the size of the datasets increases, and the accuracy, precision, recall, and root mean square error is 94%, 0.88, 0.87, and 0.19 respectively. …”
Get full text
Article -
162
A Program for Master of Information Technology
Published 2022“…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
Get full text
Other -
163
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review
Published 2024-06-01“…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
Get full text
Article -
164
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
165
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Published 2024-12-01“…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
Get full text
Article -
166
ECGConVT: A Hybrid CNN and Vision Transformer Model for Enhanced 12-Lead ECG Images Classification
Published 2024-01-01Get full text
Article -
167
-
168
Data Augmentation-Based Enhancement for Efficient Network Traffic Classification
Published 2025-01-01Get full text
Article -
169
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform
Published 2022-03-01“…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
Get full text
Article -
170
MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME
Published 2017-05-01“…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
Get full text
Article -
171
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Published 2025-01-01“…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
Get full text
Article -
172
Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights
Published 2024-12-01“…This study used an artificial neural network (ANN) to examine the effects of cyber security regulations, citizen participation, information sharing laws, and data protection on smart city development. …”
Get full text
Article -
173
Machine learning boosts wind turbine efficiency with smart failure detection and strategic placement
Published 2025-01-01Get full text
Article -
174
Multi-Population Kidney-Inspired Algorithm With Migration Policy Selections for Feature Selection Problems
Published 2025-01-01Get full text
Article -
175
Assistive Devices Analysis for Visually Impaired Persons: A Review on Taxonomy
Published 2022-01-01Get full text
Article -
176
-
177
-
178
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published 2023-12-01Get full text
Article -
179
RETRACTED ARTICLE: An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks
Published 2024-09-01“…This research contributes to the development of intelligent cyber-security models that align with 6G standards, ultimately supporting the safe and efficient integration of AVs into smart cities.…”
Get full text
Article -
180
Enhanced Photocatalytic Oxidative Coupling of Methane over Metal-Loaded TiO<sub>2</sub> Nanowires
Published 2025-01-01Get full text
Article