Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Edward Kwadwo Boahen"'
Autor:
Samuel Akwasi Frimpong, Mu Han, Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Isaac Hanson, Otu Larbi-Siaw, Isaac Baffour Senkyire
Publikováno v:
Blockchain: Research and Applications, Vol 4, Iss 1, Pp 100111- (2023)
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and e-commerce. However, it raises several questions about privacy, especially for use
Externí odkaz:
https://doaj.org/article/76610b167503483191f6acf2d2684052
Publikováno v:
IET Software, Vol 2023 (2023)
Smart contracts have gained immense popularity in recent years as self-executing programs that operate on a blockchain. However, they are not immune to security flaws, which can result in significant financial losses. These flaws can be detected usin
Externí odkaz:
https://doaj.org/article/0d1adf7f8f684feabc8e5a874ee89580
Publikováno v:
Applied Artificial Intelligence, Vol 34, Iss 11, Pp 777-791 (2020)
The primary threat to online social network (OSN) users is account compromisation. The challenge in detecting a compromised account is due to the trusted relationship established between the account owners, their friends, and the service providers. T
Externí odkaz:
https://doaj.org/article/a9797add18b643419ff7023411f84337
Publikováno v:
IEEE Transactions on Computational Social Systems. :1-13
Publikováno v:
2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
Autor:
Edward Kwadwo Boahen, Samuel Akwasi Frimpong, Martin Mabeifam Ujakpa, Rexford Nii Ayitey Sosu, Otu Larbi-Siaw, Ebenezer Owusu, Justice Kwame Appati, Ernest Acheampong
Publikováno v:
2022 IEEE World Conference on Applied Intelligence and Computing (AIC).
Publikováno v:
Electronics; Volume 11; Issue 11; Pages: 1675
Strong network connections make the risk of malicious activities emerge faster while dealing with big data. An intrusion detection system (IDS) can be utilized for alerting suitable entities when hazardous actions are occurring. Most of the technique
Publikováno v:
Computers & Security. 104:102225
Network anomalies detection is a complementary technology for systems that detect security threats in networks based on package signatures. Controlled network environments have distinguished characteristics such as higher dimensionality, more robust