default search action
1st ICAIC 2022: Victoria, TX, USA
- 1st International Conference on AI in Cybersecurity, ICAIC 2022, Victoria, TX, USA, May 24-26, 2022. IEEE 2022, ISBN 978-1-6654-0043-5
- Sayan Biswas:
Stock Price Prediction using Bidirectional LSTM with Attention. 1-5 - Richard Farrell, Xiaohong Yuan, Kaushik Roy:
IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework. 1-6 - Alex Sumner, Jinsheng Xu, Xiaohong Yuan:
Determining Phishing Emails using URL Domain Features. 1-5 - Godwyll Aikins, Sagar Jagtap, Weinan Gao:
Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations Against Cyberattacks. 1-6 - Taher M. Ghazal, Mohammad Kamrul Hasan, Haitham M. Alzoubi, Mohammed Al Hmmadi, Nidal A. Al-Dmour, Shayla Islam, Rukshanda Kamran, Beenu Mago:
Securing Smart Cities Using Blockchain Technology. 1-4 - Taher M. Ghazal, Mohammad Kamrul Hasan, Raed Abu Zitar, Nidal A. Al-Dmour, Waleed T. Al-Sit, Shayla Islam:
Cybers Security Analysis and Measurement Tools Using Machine Learning Approach. 1-4 - Salomon Ebi Esono Avomo, Abdul Samad Shibghatullah, Joseph Ng Poh Soon:
Online Booking Sports Facilities in the Republic of Equatorial Guinea. 1-5 - Kay Hooi Keoy, Yung Jing Koh, Su Mon Chit, Khalid Hafeez, Luqman Lee, Chee Ling Thong:
Impact of Assisted Technological Enablement on Entrepreneurial Success among Malaysian Higher Education Students. 1-7 - Nana Kwame Gyamfi, Dainius Ceponis, Nikolaj Goranin:
Automated System-Level Anomaly Detection and Classification Using Modified Random Forest. 1-8 - Adnan Tajul Islam Mazumdar, Shayla Islam, Chee Ling Thong, Kay Hooi Keoy:
NFC-based Mobile Application for Student Attendance in Institution of Higher Learning. 1-5 - Zheni Utic, Kandethody Ramachandran:
A Survey of Reinforcement Learning in Intrusion Detection. 1-8 - Rajeev Kumar Shah, Mohammad Kamrul Hasan, Shayla Islam, Asif Khan, Taher M. Ghazal, Ahmad Neyaz Khan:
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making. 1-8 - Ng Shao Tong, Abdul Samad Shibghatullah, Kasthuri Subaramaniam:
An Online Seafood Store Management System in Malaysia. 1-5 - Haitham M. Alzoubi, Taher M. Ghazal, Mohammad Kamrul Hasan, Asma Alketbi, Rukshanda Kamran, Nidal A. Al-Dmour, Shayla Islam:
Cyber Security Threats on Digital Banking. 1-4 - Salman Hanif, Dong Mu, Noman Hanif, Sana Hanif, Tayyaba Hanif, Omer Hanif:
The Dynamic Influence of ICT on Modern Logistic Industry in Developing Economy and CO2 Emission Using ARDL Approach: A Case of Pakistan. 1-6 - Sandeep Shah, Xiaohong Yuan, Zanetta Tyler:
An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms. 1-6 - M. Atanasio, Abdul Samad Shibghatullah, Shayla Islam:
Developing A Mobile Application for Fleet Vehicle Tracking. 1-5 - Joon Sern Lee, Kai Keng Tay, Zong Fu Chua:
BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec. 1-6 - Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib:
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. 1-8 - Bishwajeet Pandey, Tanisq Kala, Naman Bhoj, Hardik A. Gohel, Abhay Kumar, P. Sivaram:
Effective Identification of Spam Jobs Postings Using Employer Defined Linguistic Feature. 1-6 - Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, Sule Yildirim Yayilgan:
Analysing digital evidence towards enhancing healthcare security practice: The KID model. 1-9 - Muhammad Zain Malik, Sulaiman Khan, Habib Ullah Khan:
Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: A Systemic Literture Review of Busniess Sectors. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.