Showing 161 - 180 results of 195 for search '"cyber security"', query time: 0.05s Refine Results
  1. 161

    An adaptive neuro-fuzzy inference system for multinomial malware classification by Amos Orenyi Bajeh, Mary Olayinka Olaoye, Fatima Enehezei Usman-Hamza, Ikeola Suhurat Olatinwo, Peter ogirima Sadiku, Abdulkadir Bolakale Sakariyah

    Published 2025-02-01
    “…The ANFIS model was trained and tested with two prominent malware datasets from the Canada Institute of Cyber Security. The experimental results showed that the performance of the ANFIS model degrades as the size of the datasets increases, and the accuracy, precision, recall, and root mean square error is 94%, 0.88, 0.87, and 0.19 respectively. …”
    Get full text
    Article
  2. 162

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
    Get full text
    Other
  3. 163

    E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review by Abed Mutemi, Fernando Bacao

    Published 2024-06-01
    “…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
    Get full text
    Article
  4. 164

    Intrinsic assurance: a systematic approach towards extensible cybersecurity by Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG

    Published 2023-02-01
    “…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
    Get full text
    Article
  5. 165

    WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram, Muhammad Awais Azam

    Published 2024-12-01
    “…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
    Get full text
    Article
  6. 166
  7. 167
  8. 168
  9. 169

    Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform by Ka‐Wing Tse, Kevin Hung

    Published 2022-03-01
    “…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
    Get full text
    Article
  10. 170

    MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME by I. V. Novash

    Published 2017-05-01
    “…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
    Get full text
    Article
  11. 171

    Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering by P. Banerjee, Anurag K. Srivastava, Donald A. Adjeroh, Ramana Reddy, Nima Karimian

    Published 2025-01-01
    “…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
    Get full text
    Article
  12. 172

    Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights by Zhen Kuang, Junyu Su, Ahmad Latifian, Sanli Eshraghi, Alireza Ghafari

    Published 2024-12-01
    “…This study used an artificial neural network (ANN) to examine the effects of cyber security regulations, citizen participation, information sharing laws, and data protection on smart city development. …”
    Get full text
    Article
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178
  19. 179

    RETRACTED ARTICLE: An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks by Shanthalakshmi M, Ponmagal R S

    Published 2024-09-01
    “…This research contributes to the development of intelligent cyber-security models that align with 6G standards, ultimately supporting the safe and efficient integration of AVs into smart cities.…”
    Get full text
    Article
  20. 180