nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems
|
Maaref, Zineb |
|
|
27 |
C |
p. |
artikel |
2 |
Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches
|
Ouhssini, Mohamed |
|
|
27 |
C |
p. |
artikel |
3 |
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
|
Ali, Sijjad |
|
|
27 |
C |
p. |
artikel |
4 |
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT
|
Arshad, Jehangir |
|
|
27 |
C |
p. |
artikel |
5 |
A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study
|
Azam, M. Mehran Bin |
|
|
27 |
C |
p. |
artikel |
6 |
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine
|
Yin, Ziming |
|
|
27 |
C |
p. |
artikel |
7 |
A multi-dimensional framework for improving data reliability in mobile crowd sensing
|
Wu, Xu |
|
|
27 |
C |
p. |
artikel |
8 |
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications
|
Cui, Lichao |
|
|
27 |
C |
p. |
artikel |
9 |
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services
|
Wang, Zhiqun |
|
|
27 |
C |
p. |
artikel |
10 |
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks
|
Sedhuramalingam, K. |
|
|
27 |
C |
p. |
artikel |
11 |
A proposed secure framework for protecting cloud-based educational systems from hacking
|
El-Sofany, Hosam |
|
|
27 |
C |
p. |
artikel |
12 |
A resilient image encryption scheme using Laplace transform
|
Nawaz, Fariha |
|
|
27 |
C |
p. |
artikel |
13 |
A single-individual based variable neighborhood search algorithm for the blocking hybrid flow shop group scheduling problem
|
Peng, Zhongyuan |
|
|
27 |
C |
p. |
artikel |
14 |
Blockchain-supported online banking scheme
|
Tsai, Chien-Hua |
|
|
27 |
C |
p. |
artikel |
15 |
BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method
|
Ramadass, Parthasarathy |
|
|
27 |
C |
p. |
artikel |
16 |
Classification and monitoring of arm exercises using machine learning and wrist-worn band
|
Bilal Asghar, Aamer |
|
|
27 |
C |
p. |
artikel |
17 |
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique
|
Jayapradha, J. |
|
|
27 |
C |
p. |
artikel |
18 |
Data fusion for driver drowsiness recognition: A multimodal perspective
|
Priyanka, S. |
|
|
27 |
C |
p. |
artikel |
19 |
DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment
|
Srinivasa Rao, Goda |
|
|
27 |
C |
p. |
artikel |
20 |
Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion
|
Almestekawy, Abdelwahab |
|
|
27 |
C |
p. |
artikel |
21 |
Deep hybrid approach with sequential feature extraction and classification for robust malware detection
|
Singh, Swapnil |
|
|
27 |
C |
p. |
artikel |
22 |
DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain
|
Mali, Satish D. |
|
|
27 |
C |
p. |
artikel |
23 |
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm
|
Khan, Iliyas Karim |
|
|
27 |
C |
p. |
artikel |
24 |
Digital forensics for the socio-cyber world (DF-SCW): A novel framework for deepfake multimedia investigation on social media platforms
|
Ayub Khan, Abdullah |
|
|
27 |
C |
p. |
artikel |
25 |
Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree
|
Elmenyawi, Marwa A. |
|
|
27 |
C |
p. |
artikel |
26 |
Enhanced threat intelligence framework for advanced cybersecurity resilience
|
Alazab, Moutaz |
|
|
27 |
C |
p. |
artikel |
27 |
Enhancing brain tumor segmentation in MRI images: A hybrid approach using UNet, attention mechanisms, and transformers
|
Nguyen-Tat, Thien B. |
|
|
27 |
C |
p. |
artikel |
28 |
Enhancing medical image classification via federated learning and pre-trained model
|
Naga Srinivasu, Parvathaneni |
|
|
27 |
C |
p. |
artikel |
29 |
Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance
|
Yanzhuang, Xuan |
|
|
27 |
C |
p. |
artikel |
30 |
IFC: Editorial
|
|
|
|
27 |
C |
p. |
artikel |
31 |
iLDA: A new dimensional reduction method for non-Gaussian and small sample size datasets
|
Sudibyo, Usman |
|
|
27 |
C |
p. |
artikel |
32 |
Implementation and test of a Device-Free localization system with a modified desync network protocol and a weighted k-nearest neighbor algorithm
|
Sasiwat, Yoschanin |
|
|
27 |
C |
p. |
artikel |
33 |
Improving intrusion detection using LSTM-RNN to protect drones’ networks
|
Gamal, Menna |
|
|
27 |
C |
p. |
artikel |
34 |
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel
|
Kumar, Arun |
|
|
27 |
C |
p. |
artikel |
35 |
MC-ShuffleNetV2: A lightweight model for maize disease recognition
|
Zhu, Shaoqiu |
|
|
27 |
C |
p. |
artikel |
36 |
Multilevel thresholding Aerial image segmentation using comprehensive learning-based Snow ablation optimizer with double attractors
|
Abd Elaziz, Mohamed |
|
|
27 |
C |
p. |
artikel |
37 |
Prediction of one- and three-months yoga practices effect on chronic venous insufficiency based on machine learning classifiers
|
Han, Xue |
|
|
27 |
C |
p. |
artikel |
38 |
Proactive threat hunting to detect persistent behaviour-based advanced adversaries
|
Bhardwaj, Akashdeep |
|
|
27 |
C |
p. |
artikel |
39 |
Recognizing human activities with the use of Convolutional Block Attention Module
|
Zakariah, Mohammed |
|
|
27 |
C |
p. |
artikel |
40 |
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’
|
Dhana Shree, K. |
|
|
27 |
C |
p. |
artikel |
41 |
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches
|
Kumari, T. Anitha |
|
|
27 |
C |
p. |
artikel |
42 |
Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics
|
Bhardwaj, Akashdeep |
|
|
27 |
C |
p. |
artikel |
43 |
Vision-based initial localization of AGV and path planning with PO-JPS algorithm
|
Wang, Zheng |
|
|
27 |
C |
p. |
artikel |
44 |
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information
|
Xu, Shizhou |
|
|
27 |
C |
p. |
artikel |