Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects
In contemporary era of technologies, blockchain has acquired tremendous attention from
various domains. It has wide spectrum of applications ranging from finance to social services …
various domains. It has wide spectrum of applications ranging from finance to social services …
A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective
The continuous development and usage of multi-media-based applications and services
have contributed to the exponential growth of social multimedia traffic. In this context, secure …
have contributed to the exponential growth of social multimedia traffic. In this context, secure …
A survey of defensive deception: Approaches using game theory and machine learning
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
A comprehensive analyses of intrusion detection system for IoT environment
JCS Sicato, SK Singh, S Rathore… - Journal of Information …, 2020 - koreascience.kr
Abstract Nowadays, the Internet of Things (IoT) network, is increasingly becoming a
ubiquitous connectivity between different advanced applications such as smart cities, smart …
ubiquitous connectivity between different advanced applications such as smart cities, smart …
[HTML][HTML] Early detection of cyberbullying on social media networks
MF López-Vizcaíno, FJ Nóvoa, V Carneiro… - Future Generation …, 2021 - Elsevier
Cyberbullying is an important issue for our society and has a major negative effect on the
victims, that can be highly damaging due to the frequency and high propagation provided by …
victims, that can be highly damaging due to the frequency and high propagation provided by …
Social media bot detection with deep learning methods: a systematic review
Social bots are automated social media accounts governed by software and controlled by
humans at the backend. Some bots have good purposes, such as automatically posting …
humans at the backend. Some bots have good purposes, such as automatically posting …
Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
R Denis, P Madhubala - Multimedia Tools and Applications, 2021 - Springer
The exponential rise in the development of cloud computing environments in the healthcare
field, the protection and confidentiality of the medical records become a primary concern for …
field, the protection and confidentiality of the medical records become a primary concern for …
Measuring trust in social networks based on linear uncertainty theory
Z Gong, H Wang, W Guo, Z Gong, G Wei - Information Sciences, 2020 - Elsevier
In social networks, trust relationships are the basis for interactions among decision nodes.
Trust relationships are subjective and dynamic, and there are only few sample data to …
Trust relationships are subjective and dynamic, and there are only few sample data to …