Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Sayed, Md Abu"'
Domain Generation Algorithms (DGAs) are malicious techniques used by malware to dynamically generate seemingly random domain names for communication with Command & Control (C&C) servers. Due to the fast and simple generation of DGA domains, detection
Externí odkaz:
http://arxiv.org/abs/2410.21723
Autor:
Sayed, Md Abu, Tayaba, Maliha, Islam, MD Tanvir, Pavel, Md Eyasin Ul Islam, Mia, Md Tuhin, Ayon, Eftekhar Hossain, Nob, Nur, Ghosh, Bishnu Padh
Parkinson's disease (PD) is a prevalent neurodegenerative disorder known for its impact on motor neurons, causing symptoms like tremors, stiffness, and gait difficulties. This study explores the potential of vocal feature alterations in PD patients a
Externí odkaz:
http://arxiv.org/abs/2311.05435
Autor:
Miah, Jonayet, Ca, Duc M, Sayed, Md Abu, Lipu, Ehsanur Rashid, Mahmud, Fuad, Arafat, S M Yasir
Publikováno v:
2023 15th International Conference on Innovations in Information Technology (IIT) - Track 2: Artificial Intelligence in Data Science
Cardiovascular disease remains a leading cause of mortality in the contemporary world. Its association with smoking, elevated blood pressure, and cholesterol levels underscores the significance of these risk factors. This study addresses the challeng
Externí odkaz:
http://arxiv.org/abs/2311.00517
Artistic style transfer, a captivating application of generative artificial intelligence, involves fusing the content of one image with the artistic style of another to create unique visual compositions. This paper presents a comprehensive overview o
Externí odkaz:
http://arxiv.org/abs/2310.18237
Autor:
Sayed, Md Abu, Khan, Mohammad Ariful Islam, Allsup, Bryant A, Zamora, Joshua, Aggarwal, Palvi
Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making,
Externí odkaz:
http://arxiv.org/abs/2310.10662
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requi
Externí odkaz:
http://arxiv.org/abs/2309.00184
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspec
Externí odkaz:
http://arxiv.org/abs/2308.11817
Publikováno v:
20th International Conference of Computer and Information Technology (ICCIT), pp. 1-6. IEEE, 2017
Analysis of traffic pattern recognition and traffic congestion expansion in real time are one of the exciting and challenging tasks which help the government to build a robust and sustainable traffic management system specially in a densely populated
Externí odkaz:
http://arxiv.org/abs/2308.08501
Autor:
Sayed, Md Abu, Anwar, Ahmed H., Kiekintveld, Christopher, Bosansky, Branislav, Kamhoua, Charles
Publikováno v:
International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepr
Externí odkaz:
http://arxiv.org/abs/2307.13107
Publikováno v:
In Cleaner Energy Systems April 2024 7