Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art

S Rani, K Tripathi, A Kumar - International Journal on Interactive Design …, 2023 - Springer
In the last decade, the number of computer malware has grown rapidly. Currently,
cybercriminals typically use malicious software (malware) as a means of attacking industrial …

Fuzz testing molecular representation using deep variational anomaly generation

VHR Nogueira, R Sharma, RVC Guido… - Journal of Chemical …, 2024 - ACS Publications
Researchers are develo** increasingly robust molecular representations, motivating the
need for thorough methods to stress-test and validate them. Here, we use a variational auto …

Malware Detection using Anomaly Detection Algorithms

A Buriro, A Rafi, MA Yaqub… - … Conference on Ubiquitous …, 2024 - ieeexplore.ieee.org
Malware, a diverse category of software specifically engineered to compromise devices,
poses a serious threat to the security of computer systems and networks. Traditional …

A fuzzy detection approach to high-dimensional anomalies

J Zheng, N Ruan, P Wei, L Li, J Zhang - Multimedia Systems, 2024 - Springer
Rare anomalies allow to be hidden in any subspace upon a high-dimensional space so that
high-dimensional dimensional of the data brings a lot of trouble for anomalous detectors. To …

Enhancing Detection of Malicious VBA Macros in Office Documents: An Integrated Approach Employing P-Code Analysis and XGBoost-based Machine Learning …

C Ahmadi, JL Chen, YC Lai - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, the prevalence of malicious Visual Basic for
Applications (VBA) macros embedded in Office documents presents a formidable challenge …

OCR using traditional and DNN approach

B Kumar, S Tanwar, S Tiwari - Mechatronics, 2025 - taylorfrancis.com
The recent advancements in machine learning technologies have significantly impacted the
performance, accuracy, and robustness of machine learning-based applications. This …

Improvising the quality of manifold production using six-sigma technique for implementation in automobile manufacturing industries: a case study

S Kumar, A Kumar, A Kumar - Industry 4.0 Driven Manufacturing …, 2024 - Springer
In today's modern technical world, quality deals with every point of the task. Improvement will
always take place in the field of development. The paper deals with process improvement …

Navigating the Landscape of Security Threat Analysis in Cloud Computing environments

V Singh, VD Kaushik - Security and Risk Analysis for Intelligent …, 2024 - taylorfrancis.com
Currently, major activities of a country involve financial, social, business as well as
legislative connections—at all scales, including individuals, governmental as well as …

A Machine Learning Approach to Analyze Cloud Computing Attacks

S Rani, K Tripathi, Y Arora… - 2022 5th International …, 2022 - ieeexplore.ieee.org
A Cloud Computing model enables convenient, on demand network access, otherwise
known as cloud computing (CC) or" the Cloud". Cloud computing is delivered via internet …

A systematic review of protecting cloud healthcare data using blockchain: Target oriented approach

RA Khan, B Sharma, NM Thakare - AIP Conference Proceedings, 2024 - pubs.aip.org
With the rapid advancement of healthcare services into cloud-based platforms, ensuring the
security of patient data and healthcare transactions has become paramount. The need for …