Your selections:
Identification of fake news : a semantic driven technique for transfer domain
- Ferdush, Jannatul, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Das, Raj
Cyber resilience modelling for the operations of hybrid network
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Fuzzy-based operational resilience modelling
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Vulnerability assessment framework for a smart grid
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
State estimation in the presence of cyber attacks using distributed partition technique
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzuman, Joarder, Islam, Syed
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Generative malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Instruction cognitive one-shot malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Zhang, Leo
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
- Ulhaq, Anwaar, Yin, Xiaoxia, Zhang, Yunchan, Gondal, Iqbal
A mapreduce based technique for mining behavioral patterns from sensor data
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Are you sure you would like to clear your session, including search history and login status?