The use of machine learning models in intrusion detection systems (IDSs) takes more time to build the model with many features and degrade the performance. The present paper proposes an ensemble of filter feature sele...
详细信息
Introduction: Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) both have their areas of specialty in the medical imaging world. MRI is considered to be a safer modality as it exploits the magnetic propert...
详细信息
Anomaly detection is a method of categorizing unexpected data points or events in a dataset. Variational Auto-Encoders (VAEs) have proved to handle complex problems in a variety of disciplines. We propose a technique ...
详细信息
Crop disease in the agricultural is the main factor limiting yield and food quality. It requires timely diagnosis of crop illnesses for the better economy developing country. Manual crop illness assessment is limited ...
详细信息
Proposing a performance testing methodology for vehicle collision warning algorithm at intersections, this approach addresses the issues of the key V2X technology being challenging to simulate with real-scene data in ...
详细信息
Nowadays, electronic medical records are increasing rapidly. Electronic medical records consist of sensitive and confidential information. These pieces of information need to be protected from attackers during the exc...
详细信息
Cloud computing has emerged as the most successful service model for the IT/ITES community due to the various long-term incentives offered in terms of reduced cost, availability, reliability and improved QoS to the cl...
详细信息
An autonomous vehicle is anticipated to increase comfort, safety, energy efficiency, emissions reduction, and mobility. The development of autonomous vehicles depends on decision-making algorithms that can handle comp...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the *** recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the *** paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its ***,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers.
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into...
详细信息
暂无评论