Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Medical image analysis using deep learning algorithms
M Li, Y Jiang, Y Zhang, H Zhu - Frontiers in public health, 2023 - frontiersin.org
In the field of medical image analysis within deep learning (DL), the importance of
employing advanced DL techniques cannot be overstated. DL has achieved impressive …
employing advanced DL techniques cannot be overstated. DL has achieved impressive …
The deep learning applications in IoT-based bio-and medical informatics: a systematic literature review
Nowadays, machine learning (ML) has attained a high level of achievement in many
contexts. Considering the significance of ML in medical and bioinformatics owing to its …
contexts. Considering the significance of ML in medical and bioinformatics owing to its …
Trends in using deep learning algorithms in biomedical prediction systems
Y Wang, L Liu, C Wang - Frontiers in Neuroscience, 2023 - frontiersin.org
In the domain of using DL-based methods in medical and healthcare prediction systems, the
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …
[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …
protected by integrity, confidentiality, and authentication services. The network is protected …
[HTML][HTML] Android ransomware detection using supervised machine learning techniques based on traffic analysis
A Albin Ahmed, A Shaahid, F Alnasser, S Alfaddagh… - Sensors, 2023 - mdpi.com
In today's digitalized era, the usage of Android devices is being extensively witnessed in
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …
TOPSIS-based comprehensive measure of variable importance in predictive modelling
The real-world complex systems of transportation and insurance constantly produce
massive data, and the number of variables used to capture these systems can sometimes be …
massive data, and the number of variables used to capture these systems can sometimes be …
Hybrid Android malware detection: A Review of heuristic-based approach
Over the last decade, numerous research efforts have been dedicated to countering
malicious mobile applications. Given its market share, Android OS has been the primary …
malicious mobile applications. Given its market share, Android OS has been the primary …
Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning
L Yan, JL Webber, A Mehbodniya, B Moorthy… - Computers and …, 2022 - Elsevier
To resolve the problem of membership value and the control effect reliant on expert
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …