Inexorable 发表于 2025-3-25 03:43:19

Biometric E-Voting System for Cybersecurity,res of the system and the inherent cost of implementation were estimated adequately. This will guide Independent National Electoral Commission (INEC) in appropriating the allocation of resources. There is also provision for capital and content insurance cover against the fear of manipulation by elec

cataract 发表于 2025-3-25 10:11:26

Wrapper Based Approach for Network Intrusion Detection Model with Combination of Dual Filtering Tection accuracy of the minority class under the assumption that the overall distribution is unchanged and the information loss of majority samples. Three different decision tree classifiers were used to compute the performance of the selected subset features. Remarkable and outstanding fair comparison

Aggregate 发表于 2025-3-25 13:20:35

http://reply.papertrans.cn/17/1624/162362/162362_23.png

CAPE 发表于 2025-3-25 18:52:51

http://reply.papertrans.cn/17/1624/162362/162362_24.png

完全 发表于 2025-3-25 20:39:10

An Obfuscation Technique for Malware Detection and Protection in Sandboxing,s achieved through heatmaps, scroll maps, attention maps, and keyloggers. Then the data has been converted into text and it is stored in the database. The obtained data has been obfuscated and given for futher process. This is achieved through an AI tool called Delphix. Also this chapter gives an ov

AMOR 发表于 2025-3-26 00:10:33

Secure Data Sharing with Interplanetary File System for Pharmaceutical Data,raphic Smart Contracts for Device Authentication and User Access control scheme are written in Solidity Language and executed on Remix IDE. Transaction and Execution cost are evaluated for Advanced Encryption Standard (AES) algorithm and Rivest-Shamir-Adelman (RSA) algorithm in terms of ether as gas

Meditative 发表于 2025-3-26 08:22:26

http://reply.papertrans.cn/17/1624/162362/162362_27.png

切碎 发表于 2025-3-26 09:54:44

Description of a Network Attack Ontology Presented Formally,tégé, an ontology editor. The Attack Scenario class, a core class of the ontology, represents types of network attacks, for example, a Denial of Service attack. The ontology is evaluated by showing three examples of real attacks that are correctly classified by the presented ontology.

Binge-Drinking 发表于 2025-3-26 16:36:03

A Long Short Term Memory Model for Credit Card Fraud Detection,n programming language. The relevant features selected were then fed into the LSTM-RNN for classification. The results obtained were compared with past work and our fraud model recorded high classification accuracy as well as reduced false alarm rate. It has 99.58% Prediction Accuracy, 99.6% Precisi

OGLE 发表于 2025-3-26 19:09:05

http://reply.papertrans.cn/17/1624/162362/162362_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities; Sanjay Misra,Amit Kumar Tyagi Book 202