Inexorable 发表于 2025-3-25 03:43:19
Biometric E-Voting System for Cybersecurity,res of the system and the inherent cost of implementation were estimated adequately. This will guide Independent National Electoral Commission (INEC) in appropriating the allocation of resources. There is also provision for capital and content insurance cover against the fear of manipulation by eleccataract 发表于 2025-3-25 10:11:26
Wrapper Based Approach for Network Intrusion Detection Model with Combination of Dual Filtering Tection accuracy of the minority class under the assumption that the overall distribution is unchanged and the information loss of majority samples. Three different decision tree classifiers were used to compute the performance of the selected subset features. Remarkable and outstanding fair comparisonAggregate 发表于 2025-3-25 13:20:35
http://reply.papertrans.cn/17/1624/162362/162362_23.pngCAPE 发表于 2025-3-25 18:52:51
http://reply.papertrans.cn/17/1624/162362/162362_24.png完全 发表于 2025-3-25 20:39:10
An Obfuscation Technique for Malware Detection and Protection in Sandboxing,s achieved through heatmaps, scroll maps, attention maps, and keyloggers. Then the data has been converted into text and it is stored in the database. The obtained data has been obfuscated and given for futher process. This is achieved through an AI tool called Delphix. Also this chapter gives an ovAMOR 发表于 2025-3-26 00:10:33
Secure Data Sharing with Interplanetary File System for Pharmaceutical Data,raphic Smart Contracts for Device Authentication and User Access control scheme are written in Solidity Language and executed on Remix IDE. Transaction and Execution cost are evaluated for Advanced Encryption Standard (AES) algorithm and Rivest-Shamir-Adelman (RSA) algorithm in terms of ether as gasMeditative 发表于 2025-3-26 08:22:26
http://reply.papertrans.cn/17/1624/162362/162362_27.png切碎 发表于 2025-3-26 09:54:44
Description of a Network Attack Ontology Presented Formally,tégé, an ontology editor. The Attack Scenario class, a core class of the ontology, represents types of network attacks, for example, a Denial of Service attack. The ontology is evaluated by showing three examples of real attacks that are correctly classified by the presented ontology.Binge-Drinking 发表于 2025-3-26 16:36:03
A Long Short Term Memory Model for Credit Card Fraud Detection,n programming language. The relevant features selected were then fed into the LSTM-RNN for classification. The results obtained were compared with past work and our fraud model recorded high classification accuracy as well as reduced false alarm rate. It has 99.58% Prediction Accuracy, 99.6% PrecisiOGLE 发表于 2025-3-26 19:09:05
http://reply.papertrans.cn/17/1624/162362/162362_30.png