Your selections:
Identification of fake news : a semantic driven technique for transfer domain
- Ferdush, Jannatul, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Das, Raj
A framework for data privacy and security accountability in data breach communications
- Thomas, Louise, Gondal, Iqbal, Oseni, Taiwo, Firmin, Sally
Cyber resilience modelling for the operations of hybrid network
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Fuzzy-based operational resilience modelling
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Vulnerability assessment framework for a smart grid
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
AFES: An advanced forensic evidence system
- Black, Paul, Gondal, Iqbal, Brooks, Richard, Yu, Lu
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Reanimating historic malware samples
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Dynamically recommending repositories for health data : a machine learning model
- Uddin, Md Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
State estimation in the presence of cyber attacks using distributed partition technique
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzuman, Joarder, Islam, Syed
Vulnerability modelling for hybrid industrial control system networks
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Cybersecurity indexes for eHealth
- Burke, Wendy, Oseni, Taiwo, Jolfaei, Alireza, Gondal, Iqbal
Are you sure you would like to clear your session, including search history and login status?