Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Medical image analysis using deep learning algorithms
M Li, Y Jiang, Y Zhang, H Zhu - Frontiers in Public Health, 2023 - frontiersin.org
In the field of medical image analysis within deep learning (DL), the importance of
employing advanced DL techniques cannot be overstated. DL has achieved impressive …
employing advanced DL techniques cannot be overstated. DL has achieved impressive …
ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …
protected by integrity, confidentiality, and authentication services. The network is protected …
Trends in using deep learning algorithms in biomedical prediction systems
Y Wang, L Liu, C Wang - Frontiers in Neuroscience, 2023 - frontiersin.org
In the domain of using DL-based methods in medical and healthcare prediction systems, the
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …
The deep learning applications in IoT-based bio-and medical informatics: a systematic literature review
Nowadays, machine learning (ML) has attained a high level of achievement in many
contexts. Considering the significance of ML in medical and bioinformatics owing to its …
contexts. Considering the significance of ML in medical and bioinformatics owing to its …
[Retracted] Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things
An IoT system is a smart network that connects all items to the Internet and exchanges data
using Internet Engineering Task Force established protocols. As a consequence, everything …
using Internet Engineering Task Force established protocols. As a consequence, everything …
Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning
L Yan, JL Webber, A Mehbodniya, B Moorthy… - Computers and …, 2022 - Elsevier
To resolve the problem of membership value and the control effect reliant on expert
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …
[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
The Future Development Direction of Cloud‐Associated Edge‐Computing Security in the Era of 5G as Edge Intelligence
OR Devi, J Webber, A Mehbodniya… - Scientific …, 2022 - Wiley Online Library
By introducing the Internet‐of‐Everything, new usage situations such as self‐directed
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …
Android ransomware detection using supervised machine learning techniques based on traffic analysis
A Albin Ahmed, A Shaahid, F Alnasser, S Alfaddagh… - Sensors, 2023 - mdpi.com
In today's digitalized era, the usage of Android devices is being extensively witnessed in
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …