Your selections:
Identification of fake news : a semantic driven technique for transfer domain
- Ferdush, Jannatul, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Das, Raj
False data detection in a clustered smart grid using unscented Kalman filter
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
Sensitivity analysis for vulnerability mitigation in hybrid networks
- Ur‐rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Vulnerability assessment framework for a smart grid
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
State estimation within ied based smart grid using kalman estimates
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Vulnerability modelling for hybrid industrial control system networks
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Generative malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Instruction cognitive one-shot malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Mobile malware detection : an analysis of deep learning model
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur, IEEE
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Zhang, Leo
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Are you sure you would like to clear your session, including search history and login status?