1 | -- | 25 | Ali Alibeigi, Munir Abu Bakar, Adeleh Asemi. Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies |
1 | -- | 18 | Mallanagouda Biradar, Basavaraj Mathapathi. Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN |
1 | -- | 28 | Alec Wells, Aminu Bello Usman. Trust and Voice Biometrics Authentication for Internet of Things |
1 | -- | 16 | Sangita Baruah, Dhruba Jyoti Borah, Vaskar Deka. Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm |
1 | -- | 22 | Suman Thapaliya, Pawan Kumar Sharma. Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures |
1 | -- | 18 | Mohamed Guendouz, Abdelmalek Amine. A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques |
1 | -- | 18 | Jinhai Song, Zhiyong Zhang 0002, Kejing Zhao, Qinhai Xue, Brij B. Gupta. A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet |
1 | -- | 15 | Zhen Gu, Guoyin Zhang. Trajectory Data Publication Based on Differential Privacy |
1 | -- | 25 | Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias-Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj. Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing |
1 | -- | 17 | Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch. i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security |
1 | -- | 23 | Mathew Nicho, Christopher D. McDermott, Hussein Fakhry, Shini Girija. A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors |