A Machine Learning Approach to Anomaly-Based Detection on Android Platforms |
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S |
Software Engineering & Security |
7, 6, November, 2015 |
Utilizing an Entity-level Semantic Analysis Approach Towards Enhanced Policy Making |
George Manias1, Maria Angeles Sanguino2, Sergio Salmeron2, Argyro Mavrogiorgou,Athanasios Kiourtis1, |
Computer Science & Information Technology |
13, 8, May, 2023 |
GSVD: Common Vulnerability Dataset for Smart Contracts on BSC and Polygon |
Ziniu Shen, Yunfang Chen and Wei Zhang |
Computer Science & Information Technology |
13, 6, March, 2023 |
To improve the QoS in MANETs through analysis between reactive and proactive routing protocols |
1Chandan Kapoor and 2Gaurav Sharma |
Computer Science & Information Technology |
1, 3, August, 2018 |
A Powerful Chrome Extension: Translation Program using Python, Website Analysis and Google Firebase Services |
Tongde Zhao1, Khoa Tran2 |
Computer Science & Information Technology |
13, 7, April, 2023 |
A Deep Learning System for Domain-Specific Speech Recognition |
Yanan Jia |
Computer Science & Information Technology |
13, 12, July, 2023 |
Temporal Information Processing: A Survey |
Ines Berrazega |
NLP |
1, 2, August, 2012 |
A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network |
Yuchen Wang |
Software Engineering & Security |
7, 6, November, 2015 |
IOT Network Proposal for the Identification, Monitoring and Location of Crocodiles in the Estuary of Puerto Vallarta, Jalisco, Mexico. |
Miguel Angel Gallardo Lemus1, Juan Carlos Rodriguez Ramos1, Rodrigo Oliver Delgado Arcega |
Computer Science & Information Technology |
13, 7, April, 2023 |
Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers |
Alexander Veach, Munther Abualkibash |
Computer Science & Information Technology |
15, 4, August, 2023 |
A Data-Driven Application for Matching Student Traits with Learning Opportunities using Artificial Intelligence |
Chongda You, Andrew Park |
Computer Science & Information Technology |
13, 7, April, 2023 |
Gesture Recognition in Millimeter-Wave Radar based on Spatio-Temporal Feature Sequences |
Qun Fang, YiHui Yan and GuoQing Ma |
Digital Signal & Image Processing |
13, 16, September, 2023 |
Insider Threat Prevention in the US Banking System |
Oghenekome Efijemue |
Soft Computing |
14, 3, August, 2023 |
An Intelligent Program to Monitor 3D Printing and Detect Failures using Computer Vision and Machine Learning |
Christine Li, Yujia Zhang |
Computer Science & Information Technology |
13, 7, April, 2023 |
Language Distance and L3 Japanese Acquisition in Morphosyntactic Module |
Wenchao Li |
NLP |
12, 4, August, 2023 |
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing |
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar |
Software Engineering & Security |
7, 5, September, 2015 |
Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques |
Ahmed Dib1 , Sabri Ghazi2 and Mendjel Mohamed Said Mehdi2 |
Networks & Communications |
15, 4, July, 2023 |
Wi-Fi Data Analysis based on Machine Learning |
Nanumura Gedara Umal Anuraga Nanumura |
Computer Science & Information Technology |
15, 4, August, 2023 |
Heart Disease Prediction using Chi-Square Test and Linear Regression |
Dinesh Kalla and Arvind Chandrasekaran |
Computer Science & Information Technology |
13, 7, April, 2023 |
A Novel Exploit Traffic Traceback Method based on Session Relationship |
Yajing Liu, Ruijie Cai, Xiaokang Yin, and Shengli Liu |
Computer Science & Information Technology |
13, 7, April, 2023 |