[PDF][PDF] A comprehensive overview of artificial intelligence tends in education
B Namatherdhala, N Mazher… - … Research Journal of …, 2022 - researchgate.net
Artificial Intelligence technology is invading human life with its numerous leverages. Like all
other fields, education also adopted AI tools and techniques to enhance student learning …
other fields, education also adopted AI tools and techniques to enhance student learning …
Offensive language detection on social media based on text classification
P Hajibabaee, M Malekzadeh… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
There is a concerning rise of offensive language on the content generated by the crowd over
various social platforms. Such language might bully or hurt the feelings of an individual or a …
various social platforms. Such language might bully or hurt the feelings of an individual or a …
Review of deep learning methods for automated sleep staging
M Malekzadeh, P Hajibabaee… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
In order to diagnose sleep problems, it is critical to correctly identify sleep stages which is a
labor-intensive task. Due to rising data volumes, advanced algorithms, and improvements in …
labor-intensive task. Due to rising data volumes, advanced algorithms, and improvements in …
Sn4ke: Practical mutation testing at binary level
Mutation analysis is an effective technique to evaluate a test suite adequacy in terms of
revealing unforeseen bugs in software. Traditional source-or IR-level mutation analysis is …
revealing unforeseen bugs in software. Traditional source-or IR-level mutation analysis is …
Revisiting deep learning for variable type recovery
K Cao, K Leach - … IEEE/ACM 31st International Conference on …, 2023 - ieeexplore.ieee.org
Compiled binary executables are often the only available artifact in reverse engineering,
malware analysis, and software systems maintenance. Unfortunately, the lack of semantic …
malware analysis, and software systems maintenance. Unfortunately, the lack of semantic …
Delving and Unveiling the Malicious World: Implementing Malware Analysis for Preventive Approach
As technology advances, so do security concerns. Malware is one of the most dangerous
security dangers, spreading autonomously through user weaknesses or negligence …
security dangers, spreading autonomously through user weaknesses or negligence …
[PDF][PDF] Reinforcement Learning-aided Dynamic Analysis of Evasive Malware
M Bunino - 2022 - webthesis.biblio.polito.it
As cyberspace becomes more and more complex, malware authors strive to take advantage
of the growing number of vulnerabilities. This requires security researchers to invest more …
of the growing number of vulnerabilities. This requires security researchers to invest more …
A comparative analysis of open source automated malware tools
AK Agrawal - … 9th International Conference on Computing for …, 2022 - ieeexplore.ieee.org
Malwares are designed to cause harm to the machine without the user's knowledge.
Malwares belonging to different families infect the system in its own unique way causing …
Malwares belonging to different families infect the system in its own unique way causing …
Multivocal Literature Review on the Security of DevSecOp
Z Kanstantsin - Asian Journal of Research in Computer …, 2022 - publish7promo.com
DevOps revolutionize the software development lifecycle by providing agile and fast-paced
solutions. DevOps ignores security prospects since it focuses only on increasing …
solutions. DevOps ignores security prospects since it focuses only on increasing …
Enhancing Detection Rates in Cloud Environments Using Support Vector Machine Classifiers
HR Mahmood, OA Fadare, F Al-Turjman - Smart Infrastructures in the IoT …, 2025 - Springer
This study introduces an intelligent approach to boost detection in cloud environments,
specifically focusing on improving detection rates. The proposed technique implements a …
specifically focusing on improving detection rates. The proposed technique implements a …