[PDF][PDF] The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review

MM Mijwil, IE Salem, MM Ismaeel - Iraqi Journal For Computer Science and …, 2023 - iasj.net
People in the modern era spend most of their lives in virtual environments that offer a range
of public and private services and social platforms. Therefore, these environments need to …

Advancements and Challenges in Networking Technologies: A Comprehensive Survey

MA Shihab, SA Aswad, RN Othman… - 2023 7th International …, 2023 - ieeexplore.ieee.org
This survey paper provides a comprehensive overview of emerging technologies in
networking, focusing on caching in Information-Centric Networking (ICN), context-aware …

Deepfake audio detection via MFCC features using machine learning

A Hamza, ARR Javed, F Iqbal, N Kryvinska… - IEEE …, 2022 - ieeexplore.ieee.org
Deepfake content is created or altered synthetically using artificial intelligence (AI)
approaches to appear real. It can include synthesizing audio, video, images, and text …

Analyzing The Employee Turnover by Using Decision Tree Algorithm

SR Ahmed, AK Ahmed… - 2023 5th International …, 2023 - ieeexplore.ieee.org
In knowledge-based organizations, employee turnover is a significant challenge. Frequently,
a company's competitive advantage can be traced back to the tacit knowledge of its …

The Evolution of Administrative Information Systems: Assessing the Revolutionary Impact of Artificial Intelligence

NZ Mahmood, SR Ahmed, AF Al-Hayaly… - 2023 7th …, 2023 - ieeexplore.ieee.org
In the rapidly evolving landscape of organizational technologies, the integration of Artificial
Intelligence (AI) into Administrative Information Systems (AIS) stands out as a pivotal and …

Spiking Neural Network for Enhanced Mobile Robots' Navigation Control

BA Abubaker, SR Ahmed, AT Guron… - … Approaches in Smart …, 2023 - ieeexplore.ieee.org
Contemporary robotics primarily emphasizes autonomous mobile robots, and Artificial
Neural Networks (ANNs) have demonstrated their proficiency in managing intricate …

A Machine Learning Approach to Employee Performance Prediction within Administrative Information Systems

AK Ahmed, SQ Younus, SR Ahmed… - … Approaches in Smart …, 2023 - ieeexplore.ieee.org
This research project delves into the realm of employee performance prediction within
organizational contexts, employing the k-Nearest Neighbors algorithm as the core predictive …

Linguistics for Crimes in the World by AI-Based Cyber Security

MHB Abd Alkareem, FQ Nasif… - … Approaches in Smart …, 2023 - ieeexplore.ieee.org
Effective communication and comprehension of cyber threats in varied linguistic contexts are
crucial for robust defense mechanisms in the ever-changing global cybersecurity scene …

Deep Learning-Based Anomaly Detection in Network Traffic for Cyber Threat Identification

LI Khalaf, B Alhamadani, OA Ismael, AA Radhi… - Proceedings of the …, 2024 - dl.acm.org
An essential aspect of cybersecurity is the continuously growing threat landscape, which
necessitates the use of advanced anomaly detection techniques in network data. The …

Harnessing the power of Wav2Vec2 and CNNs for Robust Speaker Identification on the VoxCeleb and LibriSpeech Datasets

OH Anidjar, R Marbel, R Yozevitch - Expert Systems with Applications, 2024 - Elsevier
Speaker identification, a cornerstone of speech processing, involves associating individuals
with spoken segments within a known speaker pool. This paper presents a significant AI …