Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Aaisha Makkar"'
Publikováno v:
Mathematical Biosciences and Engineering, Vol 21, Iss 1, Pp 1527-1553 (2024)
Traditional network analysis frequently relied on manual examination or predefined patterns for the detection of system intrusions. As soon as there was increase in the evolution of the internet and the sophistication of cyber threats, the ability fo
Externí odkaz:
https://doaj.org/article/8866a2b089c34a32a85b547438d17b81
Publikováno v:
IEEE Internet of Things Journal. 10:2079-2086
In modern era, Cognitive Internet of Things (CIoT) in conjunction with IoT evolves which provides the intelligence power of sensing and computation for next-generation IoT (Nx-IoT) networks. The data scientists have discovered a large amount of techn
Publikováno v:
IEEE Transactions on Industrial Informatics. 18:6406-6414
Autor:
Aaisha Makkar, KC Santosh
Publikováno v:
International Journal of Machine Learning and Cybernetics.
Publikováno v:
IEEE Consumer Electronics Magazine. 11:21-27
Enormous amount of information is processed at different web sites, on a number of different AI tools and in multiple data silos. Sharing data between various sources, this is a significant obstacle, due to administrative, organizational and security
This letter proposes a novel malicious user prediction model based on quantum machine learning that estimates the vicious entity present in the communication system precedently before allocating the data in the distributed environments. The proposed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89508ddc239c3e0a5331b658ae826592
https://doi.org/10.36227/techrxiv.21780695.v1
https://doi.org/10.36227/techrxiv.21780695.v1
Publikováno v:
Communications in Computer and Information Science ISBN: 9783031235986
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5d4f28e857350d9ec54d3041eaf6574e
https://doi.org/10.1007/978-3-031-23599-3_26
https://doi.org/10.1007/978-3-031-23599-3_26
Autor:
Afia Farjana, Aaisha Makkar
Publikováno v:
Communications in Computer and Information Science ISBN: 9783031235986
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97189594e508f8abb8355f65c11ca8f2
https://doi.org/10.1007/978-3-031-23599-3_9
https://doi.org/10.1007/978-3-031-23599-3_9
Publikováno v:
Future Generation Computer Systems. 125:314-323
Malicious software (malware) is a major threat to the systems and networks’ security. Although anti-malware products are used to protect systems and networks against malware attacks, obfuscated malware that is capable of evading analysis and detect
Publikováno v:
IEEE Sensors Journal. 21:25352-25361
For next generation IoT applications, edge devices provides most of the computing resources close to the proximity of the end users. These devices having built-in intelligence using various AI techniques can take independent decisions in the environm