Federated learning is a decentralized machine learning paradigm that all...
The Internet of Things (IoT) has already changed our daily lives by
inte...
There exist several data-driven approaches that enable us model time ser...
It is important to predict any adversarial attacks and their types to en...
To understand how end-users conceptualize consequences of cyber security...
The problem of detecting phishing emails through machine learning techni...
Smart contract (SC) is an extension of BlockChain technology. Ethereum
B...
Sonification is the science of communication of data and events to users...
It is important and informative to compare and contrast major economic c...
Cyber-physical systems posit a complex number of security challenges due...
Online reviews play an integral part for success or failure of businesse...
This paper proposes to use Fast Fourier Transformation-based U-Net (a re...
Mainstream software applications and tools are the configurable platform...
The performance of coverage-based fault localization greatly depends on ...
We present a novel idea on adequacy testing called “vulnerability
covera...
We present an exploratory study of responses from 75 security profession...
Customers represent their satisfactions of consuming products by sharing...
Cloud computing offers users scalable platforms and low resource cost. A...
Machine learning and in particular deep learning algorithms are the emer...
The detection of zero-day attacks and vulnerabilities is a challenging
p...
Machine and deep learning-based algorithms are the emerging approaches i...
Moving Target Defense (MTD) is an emerging game-changing defense strateg...
Phishing is the simplest form of cybercrime with the objective of baitin...
The Internet enables users to access vast resources, but it can also exp...
Forecasting time series data is an important subject in economics, busin...