Linked e-resources

Details

Intro
Preface
Organization
Contents
Data Mining Techniques for Intrusion Detection on the Internet of Things Field
1 Introduction
2 Related Works
3 The Proposed Approach
4 Experimental Phase
5 Conclusions and Future Works
References
Detecting Rumors Transformed from Hong Kong Copypasta
1 Introduction
2 Existing Works
3 Design of Our Copypasta Detection Tool
3.1 Overall System Architecture
3.2 The Machine Learning Models
3.3 User Interface of the Browser Extension
4 Evaluation
4.1 Performance of the Machine Learning Models

4.2 User Evaluation
5 Conclusion and Future Work
References
Predictive Model Building for Pain Intensity Using Machine Learning Approach
1 Introduction
2 Related Work
3 Dataset
4 Feature Selection Process
5 Classification
6 Conclusion
References
Analysis of N-Way K-Shot Malware Detection Using Few-Shot Learning
1 Introduction
1.1 Literature Review
1.2 Research Limitations
1.3 Research Contributions
2 Methodology
2.1 Relation Network
2.2 Prototypical Network
2.3 Matching Network
3 Performance Evaluation and Analysis

3.1 Benchmark Datasets for Malware Detection
3.2 Performance Evaluation of the Three FSL Approaches
4 Conclusion and Future Research Directions
References
Efficient Feature Selection Approach for Detection of Phishing URL of COVID-19 Era
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Dataset Collection
3.2 Pre-processing
3.3 Features Selection and Extraction
3.4 Machine Learning Algorithms
3.5 Experimental Results and Discussion
4 Conclusion and Future Work
References
Optimal Feature Selection to Improve Vehicular Network Lifetime

1 Introduction
2 Related Works
3 Dataset
4 Methodology
4.1 Problem Statement
4.2 Proposed Model
5 Results and Discussions
6 Conclusion and Future Directions
References
Machine Learning Based Two-Tier Security Mechanism for IoT Devices Against DDoS Attacks
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 First Stage
3.2 Second Stage
4 Results and Discussions
4.1 Data Set Prepossessing
4.2 Analysis
5 Conclusion
References
An Analysis of Machine Learning Algorithms for Smart Healthcare Systems
1 Introduction

2 Machine Learning in BioMedical
3 Selected and Applied Classifiers
3.1 Logistic Regression
3.2 KNN (K Nearest Neighbors)
3.3 Gaussian Naive Bayes
4 Performance Metrics and Result Discussion
5 Conclusion
References
Blockchains and Cross-Blockchains: Privacy-Preserving Techniques
1 Introduction
1.1 Contribution
2 Blockchain, Cross-Blockchain, and Privacy Security
2.1 Blockchain
2.2 Cross-Blockchain
2.3 Privacy Services
3 Privacy-Preserving Techniques
3.1 Privacy-Preserving for Blockchain and Cross-Blockchains
3.2 Comparison of Techniques

Browse Subjects

Show more subjects...

Statistics

from
to
Export