Abstract is missing.
- IoT Based Mechanized Robot: An Integrated Process Involving Fulltime Multipurpose Control, Automation and Surveillance SystemAbdullah All Mamun Anik, Shuvodip Adhikary, Istiak Habib, Abdul Gafur. 1-6 [doi]
- ASIST: Automated Strategic Partners Ranking and Recommendation System Using NLP and Security IntelligenceFeng Ting Hoe, Purnima Murali Mohan. 1-6 [doi]
- Threat Hunting Using Elastic Stack: An EvaluationKiruthiga Subramanian, Weizhi Meng. 1-6 [doi]
- Smart Captions: A Novel Solution for Closed Captioning in Theatre Settings with AR GlassesDe Xing Ong, Kai Xiang Chia, Yi Yi Huang, Jasper Teck Siong Teo, Jezamine Tan, Melissa Lim, Dongyu Qiu, Xinxing Xia, Frank Yunqing Guan. 1-5 [doi]
- Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog ComputingSaksham Bhushan, Maode Mat. 1-6 [doi]
- LionKeeper: Automatically Discovering Timely Cybercrime Dynamics in the Age of COVID-19Adrian Chan Feng Jun, Andrew Fong En Wei, Chua Wee Chye Ryan, Goh Qing Han, Jacob Abraham, Zhengkui Wang. 1-6 [doi]
- State-of-the-Art Artificial Intelligence Based Cyber Defense ModelShah Md Istiaque, Md Toki Tahmid, Asif Iqbal Khan, Zaber Al Hassan, Sajjad Waheed. 1-6 [doi]
- ABC-Verify: AI-Blockchain Integrated Framework for Tweet Misinformation DetectionTan Hui Yang Zen, Chin Bing Hong, Purnima Murali Mohan, Vivek Balachandran. 1-5 [doi]
- Enhance Enterprise Security through Implementing ISO/IEC 27001 StandardHuaqun Guo, Meng Wei, Ping Huang, Eyasu Getahun Chekole. 1-6 [doi]
- Artificial Intelligence Based Cybersecurity: Two-Step Suitability TestShah Md Istiaque, Md Toki Tahmid, Asif Iqbal Khan, Zaber Al Hassan, Sajjad Waheed. 1-6 [doi]
- Anomaly Detection in Evolutionary Social Networks leveraging Community StructureArnab Kumar Ghoshal, Nabanita Das. 1-6 [doi]
- Deep RNN-based Traffic Analysis Scheme for Detecting Target ApplicationsPrajwal Kaushal. 1-5 [doi]
- Fault Analysis of the ARIA and uBlock Block CiphersQinglin Wang, Jiqiang Lu. 1-6 [doi]
- An Analysis of Machine Learning Algorithms and Deep Neural Networks for Email Spam Classification using Natural Language ProcessingMd. Mohidul Hasan, Syed Mahbubuz Zaman, Md. Asif Talukdar, Ayesha Siddika, Md. Golam Rabiul Alam. 1-6 [doi]
- How COVID-19 Has Affected the Internet of Things (IoT) TechnologyMaha A Abdullah, Mazen A Abdullah. 1-6 [doi]
- Evaluation of Universities' Integrated Reports Using Text Mining TechniqueTakumi Miura, Takumi Furukawa, Junko Harada, Yudai Hirano, Takako Hashimoto. 1-6 [doi]
- Implementing Hybrid Amplifiers for DWDM System using Artificial Intelligence MethodsInderpreet Kaur, Manpreet Singh Manna, Ramalatha Marimuthu. 1-5 [doi]
- DARUD: Detecting and Arresting Rogue USB Devices in the V2X EcosystemEyasu Getahun Chekole, Huaqun Guo. 1-6 [doi]
- Long-term Time Series Data Clustering of Stock Prices for Portfolio SelectionYukari Shirota, Akane Murakami. 1-6 [doi]
- Non-Verbal Auditory Aspects of Human-Service Robot InteractionJeannie S. Lee, Muhamed Fauzi Bin Abbas, Chee Kiat Seow, Qi Cao, Kar-Peo Yar, Sye Loong Keoh, Ian McLoughlin 0001. 1-5 [doi]
- Research on security technology framework of UAV cluster systemKunlun Wei, Tao Zhang. 1-5 [doi]
- Performance Analysis of Extended Lustgarten Index for Stability of Feature SelectionRikta Sen, Ashis Kumar Mandal, Basabi Chakraborty. 1-5 [doi]
- A Visualization and Analysis tool for VCL Auto-generation Code FrameworkRyan Kirwan, Javihn Che, Woo Jia Le, Stefan Sarin. 1-5 [doi]