All Stories

  1. Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review
  2. Noise-Injected Multi-Head Attention for Robust Medical Image Classification
  3. Human-Centered Artificial Intelligence in Higher Education: A Framework for Systematic Literature Reviews
  4. Cybersecurity Analytics for Enterprise Environment: A Systematic Literature Review
  5. Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
  6. Optimizing Resource Allocation for Multi-beam Satellites Using Genetic Algorithm Variations
  7. Comparative Performance of Deep Learning Models in Detecting Invasive Ductal Carcinoma
  8. Developing Effective Techniques for the Recognition of Shanghai Dialect Text
  9. A Methodological Framework for Designing Human-Centered Artificial Intelligence Services
  10. ST-GNN-Powered Compression for Latency Reduction in Hybrid Satellite-Terrestrial Networks
  11. Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification
  12. Literature Review as a Service: A Human-Centered Artificial Intelligence Approach
  13. Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises
  14. Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
  15. A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset
  16. A COMPARATIVE ANALYSIS OF DIFFUSION-BASED SUPER-RESOLUTION TECHNIQUES IN A VIDEO STREAM COMPRESSION SYSTEM IN FPV CONTROL OF UNM ANNED SYSTEMS
  17. Unveiling the Power of Pretrained Models for Neural Machine Translation in Vietnamese Language: A Comparative Analysis
  18. SafeDocs: A Machine Learning-Based Framework for Malicious PDF Detection Tailored for SMEs
  19. Federated Learning for Linux Malware Detection: An Experimental Study
  20. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks
  21. Leveraging FFT and Hybrid EfficientNet for Enhanced Action Recognition in Video Sequences
  22. Exploring Common Malware Persistence Techniques on Windows Operating Systems (OS) for Enhanced Cybersecurity Management
  23. A comparative analysis of email phishing detection methods: a deep learning perspective
  24. Graph Neural Networks for Traffic Classification in Satellite Communication Channels: A Comparative Analysis
  25. A Horizontal Federated-Learning Model for Detecting Abnormal Traffic Generated by Malware in IoT Networks
  26. Utilizing InfoGAN and PE Header Features for Synthetic Ransomware Image Generation: An Experimental Study
  27. Classification of Ransomware Families Based on Hashing Techniques
  28. Blockchain-Driven Hybrid Model for IoT Authentication
  29. DTTP Model - A Deep Learning-Based Model for Detecting and Tracking Target Person
  30. Danaflood: A Solution for Scalable Urban Street Flood Sensing
  31. Determination of Subscribers Coordinates using Flying Network for Emergencies
  32. DeepPlace: Deep reinforcement learning for adaptive flow rule placement in Software-Defined IoT Networks
  33. Malware Spreading Model for Routers in Wi-Fi Networks
  34. An Efficient Feature Extraction Method for Attack Classification in IoT Networks
  35. A Combined Attack Scenario to Exploit the Join Procedure of LoRaWAN
  36. CARS: Dynamic Cyber-attack Reaction in SDN-based Networks with Q-learning
  37. A Behavior-Based Malware Spreading Model for Vehicle-to-Vehicle Communications in VANET Networks
  38. Determination of Subscribers Coordinates using Flying Network for Emergencies
  39. LoRa Link Quality Estimation Based on Support Vector Machine
  40. Comparison of machine learning algorithms for DDoS attack detection in SDN
  41. The 1-Millisecond Challenge – Tactile Internet: From Concept to Standardization
  42. Positioning Methods Based on Flying Network for Emergencies
  43. Evaluation of Routing Protocols for Multi-hop Communication in LPWAN
  44. Research on Using the AODV Protocol for a LoRa Mesh Network
  45. Flying Ad-Hoc Network for Emergency Based on IEEE 802.11p Multichannel MAC Protocol
  46. A Priority-Based Multichannel Mac to Support the Non-Safety Applications in V2I Communication
  47. A MULTI-CRITERIA PRIORITY-BASED V2I COMMUNICATION FOR INFORMATION DISSEMINATION AT RSU IN VANET
  48. The multipolling mechanism based on the prioritization for WLAN network with multiple access points