[PDF][PDF] A comprehensive overview of artificial intelligence tends in education

B Namatherdhala, N Mazher… - … Research Journal of …, 2022 - researchgate.net
Artificial Intelligence technology is invading human life with its numerous leverages. Like all
other fields, education also adopted AI tools and techniques to enhance student learning …

Offensive language detection on social media based on text classification

P Hajibabaee, M Malekzadeh… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
There is a concerning rise of offensive language on the content generated by the crowd over
various social platforms. Such language might bully or hurt the feelings of an individual or a …

Review of deep learning methods for automated sleep staging

M Malekzadeh, P Hajibabaee… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
In order to diagnose sleep problems, it is critical to correctly identify sleep stages which is a
labor-intensive task. Due to rising data volumes, advanced algorithms, and improvements in …

Sn4ke: Practical mutation testing at binary level

M Ahmadi, P Kiaei, N Emamdoost - arxiv preprint arxiv:2102.05709, 2021 - arxiv.org
Mutation analysis is an effective technique to evaluate a test suite adequacy in terms of
revealing unforeseen bugs in software. Traditional source-or IR-level mutation analysis is …

Revisiting deep learning for variable type recovery

K Cao, K Leach - … IEEE/ACM 31st International Conference on …, 2023 - ieeexplore.ieee.org
Compiled binary executables are often the only available artifact in reverse engineering,
malware analysis, and software systems maintenance. Unfortunately, the lack of semantic …

Delving and Unveiling the Malicious World: Implementing Malware Analysis for Preventive Approach

SP Bejo, P Jha, B Kumar… - 2023 World Conference …, 2023 - ieeexplore.ieee.org
As technology advances, so do security concerns. Malware is one of the most dangerous
security dangers, spreading autonomously through user weaknesses or negligence …

[PDF][PDF] Reinforcement Learning-aided Dynamic Analysis of Evasive Malware

M Bunino - 2022 - webthesis.biblio.polito.it
As cyberspace becomes more and more complex, malware authors strive to take advantage
of the growing number of vulnerabilities. This requires security researchers to invest more …

A comparative analysis of open source automated malware tools

AK Agrawal - … 9th International Conference on Computing for …, 2022 - ieeexplore.ieee.org
Malwares are designed to cause harm to the machine without the user's knowledge.
Malwares belonging to different families infect the system in its own unique way causing …

Multivocal Literature Review on the Security of DevSecOp

Z Kanstantsin - Asian Journal of Research in Computer …, 2022 - publish7promo.com
DevOps revolutionize the software development lifecycle by providing agile and fast-paced
solutions. DevOps ignores security prospects since it focuses only on increasing …

Enhancing Detection Rates in Cloud Environments Using Support Vector Machine Classifiers

HR Mahmood, OA Fadare, F Al-Turjman - Smart Infrastructures in the IoT …, 2025 - Springer
This study introduces an intelligent approach to boost detection in cloud environments,
specifically focusing on improving detection rates. The proposed technique implements a …