Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
S Rani, K Tripathi, A Kumar - International Journal on Interactive Design …, 2023 - Springer
In the last decade, the number of computer malware has grown rapidly. Currently,
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
Fuzz testing molecular representation using deep variational anomaly generation
Researchers are develo** increasingly robust molecular representations, motivating the
need for thorough methods to stress-test and validate them. Here, we use a variational auto …
need for thorough methods to stress-test and validate them. Here, we use a variational auto …
Malware Detection using Anomaly Detection Algorithms
Malware, a diverse category of software specifically engineered to compromise devices,
poses a serious threat to the security of computer systems and networks. Traditional …
poses a serious threat to the security of computer systems and networks. Traditional …
A fuzzy detection approach to high-dimensional anomalies
J Zheng, N Ruan, P Wei, L Li, J Zhang - Multimedia Systems, 2024 - Springer
Rare anomalies allow to be hidden in any subspace upon a high-dimensional space so that
high-dimensional dimensional of the data brings a lot of trouble for anomalous detectors. To …
high-dimensional dimensional of the data brings a lot of trouble for anomalous detectors. To …
Enhancing Detection of Malicious VBA Macros in Office Documents: An Integrated Approach Employing P-Code Analysis and XGBoost-based Machine Learning …
C Ahmadi, JL Chen, YC Lai - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, the prevalence of malicious Visual Basic for
Applications (VBA) macros embedded in Office documents presents a formidable challenge …
Applications (VBA) macros embedded in Office documents presents a formidable challenge …
OCR using traditional and DNN approach
The recent advancements in machine learning technologies have significantly impacted the
performance, accuracy, and robustness of machine learning-based applications. This …
performance, accuracy, and robustness of machine learning-based applications. This …
Improvising the quality of manifold production using six-sigma technique for implementation in automobile manufacturing industries: a case study
In today's modern technical world, quality deals with every point of the task. Improvement will
always take place in the field of development. The paper deals with process improvement …
always take place in the field of development. The paper deals with process improvement …
Navigating the Landscape of Security Threat Analysis in Cloud Computing environments
Currently, major activities of a country involve financial, social, business as well as
legislative connections—at all scales, including individuals, governmental as well as …
legislative connections—at all scales, including individuals, governmental as well as …
A Machine Learning Approach to Analyze Cloud Computing Attacks
S Rani, K Tripathi, Y Arora… - 2022 5th International …, 2022 - ieeexplore.ieee.org
A Cloud Computing model enables convenient, on demand network access, otherwise
known as cloud computing (CC) or" the Cloud". Cloud computing is delivered via internet …
known as cloud computing (CC) or" the Cloud". Cloud computing is delivered via internet …
A systematic review of protecting cloud healthcare data using blockchain: Target oriented approach
RA Khan, B Sharma, NM Thakare - AIP Conference Proceedings, 2024 - pubs.aip.org
With the rapid advancement of healthcare services into cloud-based platforms, ensuring the
security of patient data and healthcare transactions has become paramount. The need for …
security of patient data and healthcare transactions has become paramount. The need for …