Search Documentation
Published Research
- Defending Characteristics and Attribution Analysis for Phishing Attacks
- Artificial Intelligence-Driven Solutions for Phishing Detection: A Comparative Analysis of Machine Learning Models
- Blockchain-Based Security Algorithms Evaluation for SCADA/ICS Systems
- Real-Time Detection of Time-Based Blind SQL Injection Using Machine Learning for Critical Infrastructure
- Analytical Study for DDoS Detection Algorithms in Cloud Computing
- Wireless Telecommunications Uprising through 4G Long Term Evolution (LTE)
- Comparing Machine Learning Algorithms for Detection and Prevention of Cyber-Attacks on IoT Devices: A Literature Review
- SVM Enhanced Detection of Volume-Based Attacks in IoT Networks
- Comparative Analysis of AI-Powered Image Recognition for Dermatological Diagnosis
- Maximizing the Processing Rate for Streaming Applications in Apache Storm
- Analytical Study on Advanced Persistent Threat Detecting, Defending and Mitigating
- Comparative Study of Defense Algorithms Against Denial of Service and Distributed Denial of Service Attacks