Showing 1–20 of 33 results
/ Date/ Name
Oct 13, 2021Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare SystemFeb 28, 2021Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with ClusteringSep 23, 2021LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection ApproachSep 23, 2021ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGeneratorMar 7, 2019Detection of Advanced Malware by Machine Learning TechniquesDec 28, 2023Gravitational wave: generation and detection techniquesFeb 23, 2018An investigation of the classifiers to detect android malicious appsDec 30, 2019Secure Communication Protocol for Smart Transportation Based on Vehicular CloudApr 19, 2020Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server ArchitectureApr 21, 2019Android Malicious Application Classification Using ClusteringDec 26, 2020Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDSFeb 28, 2021Identification of Significant Permissions for Efficient Android Malware DetectionJun 23, 2016A Communication Efficient and Scalable Distributed Data Mining for the Astronomical DataJul 22, 2020A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite ImagerySep 16, 2018Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware DetectionJun 22, 2016An effective approach for classification of advanced malware with high accuracyDec 2, 2015Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector MachineApr 21, 2025AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3Oct 16, 2020DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDSJun 6, 2022Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review