-
41
Adaptation of object detection networks under anomalous conditions
Published 2023Get full text
Final Year Project (FYP) -
42
Class-based attack on graph convolution network
Published 2022Get full text
Final Year Project (FYP) -
43
Adversarial robustness of deep reinforcement learning
Published 2022Get full text
Thesis-Doctor of Philosophy -
44
Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture /
Published 2023“…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. …”
Get full text
Get full text
software, multimedia -
45
Cognizant multitasking in multiobjective multifactorial evolution : MO-MFEA-II
Published 2021“…Thus, in the absence of any prior knowledge about the relationships between optimization functions, a threat of predominantly negative (harmful) transfer prevails. …”
Get full text
Journal Article -
46
-
47
Malicious JavaScript detection web service
Published 2016“…Once users access to them without the strong protection from anti-virus products, users’ computers might be harmed and their information might be stolen. One of the biggest threats in these websites is the Malicious JavaScript. …”
Get full text
Final Year Project (FYP) -
48
“Better Networks” Project is Working to Improve Cybersecurity
Published 2024“…In collaboration with the MIT Sociotechnical Systems Research Center and the Air Force, the Lincoln Laboratory Supercomputing Center is working to develop better sensors using Laboratory developed Dynamic Distributed Dimensional Data Model (D4M) technology and artificial intelligence algorithms to support defensive cyber operations.…”
Get full text
Article -
49
Assignment optimization of pandemic influenza antiviral drugs in Urban pharmacies
Published 2020Get full text
Journal Article -
50
Handbook of Research on Deep Learning Techniques for Cloud-Based Industrial IoT /
Published 2023Get full text
software, multimedia -
51
Human activity recognition based on smartphone sensors
Published 2019“…Human Activity Recognition otherwise called as HAR is a challenging research field that promotes quality of life by means of ambient intelligence and assisted living. The fundamental step for the development of intelligent system is to understand and start learning the human activities in the real time environment. …”
Get full text
Thesis -
52
Streamlining Organizational Processes Through AI, IoT, Blockchain, and Virtual Environments /
Published [202Get full text
software, multimedia -
53
A byte sequence is worth an image: CNN for file fragment classification using bit shift and n-gram embeddings
Published 2024Get full text
Conference Paper -
54
Subtle, natural and socially acceptable interaction techniques for ringterfaces : finger-ring shaped user interfaces
Published 2013“…We highlight the need for studying context awareness in ambient intelligence environments and end-user programming in future research on ringterfaces.…”
Get full text
Get full text
Conference Paper -
55
Two sides of the same coin : boons and banes of machine learning in hardware security
Published 2022Get full text
Journal Article -
56
An RF energy harvester
Published 2017“…For those sensor networks, they are used in various scenarios such as intelligent monitoring systems for office, medical, or military applications. …”
Get full text
Final Year Project (FYP) -
57
Enhancement of a Stepping Stone Detection Algorithm Using Data Mining and Associate Rule Techniques (S/O: 12896)
Published 2020“…Less accurate detection and Active Perturbation Attack (APA) is the most problem that becomes a threat to SSD approach itself. By using hybrid approach to increase an accurate detection and intelligent technique to overcome the APA problem, this research proposed the combination of hybrid and intelligent SSD to as create Hybrid Intelligent SSD (HI-SSD). …”
Get full text
Monograph -
58
-
59
-
60