[PDF][PDF] Federated rnn-based detection of ransomware attacks: A privacy-preserving approach

X Zhang, C Wang, R Liu, S Yang - 2024 - files.osf.io
The rise of ransomware as a predominant cybersecurity threat has necessitated the
development of innovative detection mechanisms capable of adapting to the rapidly …

[PDF][PDF] Advanced ransomware detection and classification via semantic analysis of memory opcode patterns

T Lowev, C Fisher, J Collins - 2024 - files.osf.io
Ransomware attacks have become one of the most prevalent and damaging forms of cyber
threats, with their increasing sophistication posing significant challenges to traditional …

Internet of things enabled E-learning system for academic achievement among university students

MA Haque, S Ahmad, MA Hossain… - E-Learning and …, 2024 - journals.sagepub.com
The rise of the Internet of Things (IoT) represents a burgeoning frontier in educational
innovation, particularly in the realm of e-learning. Despite its expanding capabilities, the …

6G wireless communication networks: challenges and potential solution

MA Haque, S Ahmad, AJ Abboud… - International Journal of …, 2024 - igi-global.com
This paper presents a comprehensive survey of security needs, applications, and current
challenges and threats for 6G wireless communication networks. 6G technology has brought …

Enhancing IoT Data Analysis with Machine Learning: A Comprehensive Overview

AK Dinkar, MA Haque, AK Choudhary - LatIA, 2024 - latia.ageditor.uy
Machine learning techniques are essential for processing the vast volume of IoT data
efficiently, improving performance, and managing IoT applications effectively. Machine …

[PDF][PDF] Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis

MA Haque, MS Raza, S Ahmad… - Data and …, 2024 - pdfs.semanticscholar.org
Introduction: artificial intelligence (AI) and Machine Learning have become buzzwords lately
due to technological changes and data quality testing, especially in shape and finish …

Analysis of Cyberbullying Behaviors Using Machine Learning: A Study on Text Classification

AK Anand, RK Mahto, A Prasad - LatIA, 2025 - latia.ageditor.uy
Introduction: Cyberbullying is a significant concern in today's digital age, affecting
individuals across various demographics. Objective: This study aims to analyze and classify …

Malware Behavior Detection System with RAG-Enhanced eBPF and Advanced Language Model

S Yu, Z Li, J Chen, X Deng… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The article focuses on the malware threat within network security, especially the challenge of
behavior detection on Linux systems. Traditional methods have limitations since static …

Unveiling the Power of the Internet of Things: Exploring Services, Applications, and Overcoming Challenges

A Kumar, A Haque, A Hossain, S Raza, M Rahman… - LatIA, 2024 - dialnet.unirioja.es
Resumen The Internet of Things (IoT) has transcended its futuristic perception and become
an omnipresent reality. Its pervasive nature encompasses devices, sensors, clouds, big …

[PDF][PDF] Phishing Website Detection: A Dataset-Centric Approach for Enhanced Security

S Ahmad, A Haque, HAM Abdeljaber, MU Bokhari… - 2024 - researchgate.net
Introduction: phishing involves cybercriminals creating fake websites that appear to be real
sites with the aim of obtaining personal information. With the increasing sophistication of …