All Stories

  1. Enhanced Weather Monitoring and Prediction with IoT and Deep Learning
  2. Integrating neural networks and spark for cloud security: A unified dataset approach to network intrusion detection
  3. From Prototyping to Deployment
  4. Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation
  5. Collinsella aerofaciens linked with increased ethanol production and liver inflammation contribute to the pathophysiology of NAFLD
  6. Understanding and using Animal Models of Hepatotoxicity
  7. Applications of Federated Deep Learning Models in Healthcare Era
  8. Review of: "Revolutionizing Precision Agriculture with Drone-Based Imaging and Fuzzy Intelligent Algorithms"
  9. A Simulation‐Based Study of a Digital Twin Model of the Air Purifier System in Chandigarh Using LabVIEW
  10. Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
  11. Fire Detection in Urban Areas Using Multimodal Data and Federated Learning
  12. Enhancing fault detection and classification in optical fiber networks with deep learning algorithms
  13. Enhanced radar-based human suspicious activity classification using transfer learning methods
  14. Deep learning and expert knowledge to boost the accuracy and robustness of apple leaf disease classification
  15. IoT-enabled deep learning framework for accurate animal head tracking
  16. Enhancing aerospace image classification using state-of-the-art deep learning models: Insights from Kaggle
  17. Deep Learning and Blockchain Applications in Healthcare Sector Using Imaging Data
  18. Review of: "Comparing YOLOv8 and Mask RCNN for object segmentation in complex orchard environments"
  19. Optimizing Real- Time Threat Detection with Feature Engineering Strategies for Intelligent NIDS
  20. Ethical Hacking through Foot Printing: A Machine Learning Strategy
  21. Intelligent Service Oriented Architecture (SOA) for State-of-the-Art IoT-DDoS Defense and Research Challenges
  22. ROAD: Robotics-Assisted Onsite Data Collection and Deep Learning Enabled Robotic Vision System for Identification of Cracks on Diverse Surfaces
  23. Face mask detection in foggy weather from digital images using transfer learning
  24. Spark-based Distributed Intelligent Network Intrusion Detection System for Unified Dataset
  25. Web Server Security Solution for Detecting Cross-site Scripting Attacks in Real-time Using Deep Learning
  26. LoRa-Based IoT Architecture Using Ant Colony Optimization for Intelligent Traffic System
  27. From slides to insights: Harnessing deep learning for prognostic survival prediction in human colorectal cancer histology
  28. IoT-Fog-enabled robotics-based robust classification of hazy and normal season agricultural images for weed detection
  29. Performance Evaluation of Path Restoration Techniques in a Network
  30. An Efficient Energy-Aware Load Balancing Method for Cloud Computing
  31. Network Intrusion Detection System Employing Big Data and Intelligent Learning Methods
  32. iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
  33. SDN‐Based Cloud Combining Edge Computing for IoT Infrastructure
  34. Security and Resilience of Cyber Physical Systems
  35. Feature Selection Algorithm Characterization for NIDS using Machine and Deep learning
  36. An Intelligent Framework for Alzheimer's disease Classification Using EfficientNet Transfer Learning Model
  37. Digital Image Processing and IoT in Smart Health Care -A review
  38. AIDAAS: Incident Handling and Remediation Anomaly-based IDaaS for Cloud Service Providers
  39. An Efficient Model of IGP for Network-based Communication: A Comparison
  40. Introspecting Intrusion Detection Systems in Dealing with Security Concerns in Cloud Environment
  41. Global Intrusion Detection Environments and Platform for Anomaly-Based Intrusion Detection Systems
  42. Augmenting Border Gateway Protocol with Multi-protocol Label Switching for Enhancing Network Path Restoration
  43. Diverse Methods for Signature based Intrusion Detection Schemes Adopted
  44. REVIEW OF EXISTING DATA SETS FOR NETWORK INTRUSION DETECTION SYSTEM
  45. Issues and Emerging Trends in Identity Management
  46. Security threats to mobile agents
  47. Virtualization as an Engine to Drive Cloud Computing Security
  48. Web Client and Web Server approaches to Prevent XSS Attacks