All Stories

  1. Integrating neural networks and spark for cloud security: A unified dataset approach to network intrusion detection
  2. From Prototyping to Deployment
  3. Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation
  4. Collinsella aerofaciens linked with increased ethanol production and liver inflammation contribute to the pathophysiology of NAFLD
  5. Understanding and using Animal Models of Hepatotoxicity
  6. Applications of Federated Deep Learning Models in Healthcare Era
  7. Review of: "Revolutionizing Precision Agriculture with Drone-Based Imaging and Fuzzy Intelligent Algorithms"
  8. A Simulation‐Based Study of a Digital Twin Model of the Air Purifier System in Chandigarh Using LabVIEW
  9. Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
  10. Fire Detection in Urban Areas Using Multimodal Data and Federated Learning
  11. Enhancing fault detection and classification in optical fiber networks with deep learning algorithms
  12. Enhanced radar-based human suspicious activity classification using transfer learning methods
  13. Deep learning and expert knowledge to boost the accuracy and robustness of apple leaf disease classification
  14. IoT-enabled deep learning framework for accurate animal head tracking
  15. Enhancing aerospace image classification using state-of-the-art deep learning models: Insights from Kaggle
  16. Deep Learning and Blockchain Applications in Healthcare Sector Using Imaging Data
  17. Review of: "Comparing YOLOv8 and Mask RCNN for object segmentation in complex orchard environments"
  18. Optimizing Real- Time Threat Detection with Feature Engineering Strategies for Intelligent NIDS
  19. Ethical Hacking through Foot Printing: A Machine Learning Strategy
  20. Intelligent Service Oriented Architecture (SOA) for State-of-the-Art IoT-DDoS Defense and Research Challenges
  21. ROAD: Robotics-Assisted Onsite Data Collection and Deep Learning Enabled Robotic Vision System for Identification of Cracks on Diverse Surfaces
  22. Face mask detection in foggy weather from digital images using transfer learning
  23. Spark-based Distributed Intelligent Network Intrusion Detection System for Unified Dataset
  24. Web Server Security Solution for Detecting Cross-site Scripting Attacks in Real-time Using Deep Learning
  25. LoRa-Based IoT Architecture Using Ant Colony Optimization for Intelligent Traffic System
  26. From slides to insights: Harnessing deep learning for prognostic survival prediction in human colorectal cancer histology
  27. IoT-Fog-enabled robotics-based robust classification of hazy and normal season agricultural images for weed detection
  28. Performance Evaluation of Path Restoration Techniques in a Network
  29. An Efficient Energy-Aware Load Balancing Method for Cloud Computing
  30. Network Intrusion Detection System Employing Big Data and Intelligent Learning Methods
  31. iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
  32. SDN‐Based Cloud Combining Edge Computing for IoT Infrastructure
  33. Security and Resilience of Cyber Physical Systems
  34. Feature Selection Algorithm Characterization for NIDS using Machine and Deep learning
  35. An Intelligent Framework for Alzheimer's disease Classification Using EfficientNet Transfer Learning Model
  36. Digital Image Processing and IoT in Smart Health Care -A review
  37. AIDAAS: Incident Handling and Remediation Anomaly-based IDaaS for Cloud Service Providers
  38. An Efficient Model of IGP for Network-based Communication: A Comparison
  39. Introspecting Intrusion Detection Systems in Dealing with Security Concerns in Cloud Environment
  40. Global Intrusion Detection Environments and Platform for Anomaly-Based Intrusion Detection Systems
  41. Augmenting Border Gateway Protocol with Multi-protocol Label Switching for Enhancing Network Path Restoration
  42. Diverse Methods for Signature based Intrusion Detection Schemes Adopted
  43. REVIEW OF EXISTING DATA SETS FOR NETWORK INTRUSION DETECTION SYSTEM
  44. Issues and Emerging Trends in Identity Management
  45. Security threats to mobile agents
  46. Virtualization as an Engine to Drive Cloud Computing Security
  47. Web Client and Web Server approaches to Prevent XSS Attacks