Detection of virtual private network traffic using machine learning

S Miller, K Curran, T Lunney - International Journal of Wireless …, 2020 - igi-global.com
The detection of unauthorized users can be problematic for techniques that are available at
present if the nefarious actors are using identity hiding tools such as anonymising proxies or …

A predictive model for high/low risk group according to oncotype DX recurrence score using machine learning

I Kim, HJ Choi, JM Ryu, SK Lee, JH Yu, SW Kim… - European Journal of …, 2019 - Elsevier
Abstract Background Oncotype DX (ODX) is a 21-gene breast cancer recurrence score (RS)
assay that aids in decision-making for chemotherapy in early-stage hormone receptor …

[PDF][PDF] A review of cloud oriented mobile learning platform and frameworks

ASBM Noor, MNY Atoom, R Mamat - International Journal of …, 2019 - researchgate.net
With the continued growth of mobile devices usage, wireless communications improvement,
and cloud computing evolution, many educational institutions around the world, especially …

[PDF][PDF] Classification of cyber attack using machine learning technique at microsoft azure cloud

R Chourasiya, V Patel, A Shrivastava - Int. Res. J. Eng. Appl. Sci, 2018 - irjeas.org
Security of valuable information is always a very essential issue for modern digital world.
Intrusion Detection System (IDS) and many security techniques is widely used against cyber …

Network Security with Network Intrusion Detection System using Machine Learning Deployed in a Cloud Infrastructure

C Kaushik, T Ram, C Ritvik… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
A software/device which monitors the network or the internet for any cyber-attack or
malicious activity is called Network Intrusion Detection System (NIDS). The conventional …

Ag-mic: Azure-based generalized flow for medical image classification

S Roychowdhury, M Bihis - IEEE Access, 2016 - ieeexplore.ieee.org
Medical image-based research requires heavy computational workload associated with
image analysis and collaborative device independent platforms to incorporate expert …

[PDF][PDF] Convergence of cloud computing, internet of things, and machine learning: The future of decision support systems

G Crespo-Perez, A Ojeda-Castro - Int. J. Sci. Technol. Res, 2017 - researchgate.net
The objective of this research was to develop a framework for understanding the
Convergence of Cloud Computing, Machine Learning, and Internet of Things as the future of …

Traffic classification for the detection of anonymous web proxy routing

S Miller, K Curran, T Lunney - International Journal for Information …, 2015 - pure.ulster.ac.uk
There is an increasing need to be able to classify whether an incoming packet is from a
legitimate originating IP address or has been modified through an intermediate proxy or …

Design and simulation of loan approval prediction model using AWS platform

HV Ramachandra, G Balaraju… - … on emerging smart …, 2021 - ieeexplore.ieee.org
To determine and to understand the working of loan systems for the cause of Loan
Prediction using the demographic information of various factors that combine to form the …

[PDF][PDF] Cyber Attack Detection and Classification Using Mahcine Learning Technique Using Microsoft Azure Cloud

R Pohekari, V Patel, A Shrivastava - International Research Journal of …, 2017 - irjeas.org
Information security is always a very important issue for modern computer world. Intrusion
Detection System (IDS) as the security technique and is widely used against intrusions …