As the digital world continues to grow, the need for robust and secure authentication systems to protect sensitive information has never been more important. This paper introduces a developing approach to login securi...
详细信息
Crowdsourcing platforms have become essential tools for managing various tasks, relying on distributed labour practices to enhance productivity and goal achievement. However, they often encounter challenges such as un...
详细信息
This paper addresses the significant global impact of lung cancer, the primary cause of cancer-related deaths worldwide and the second leading cause of mortality following cardiovascular disease. The challenge lies in...
详细信息
A Deterministic Finite Automaton (DFA) is a theoretical model of computation used to design and analyze the behavior of systems with a finite number of states, where each state transitions deterministically based on i...
详细信息
This research analyzes the usefulness of YOLOv8 for robust pedestrian recognition in demanding real world situations. A custom-trained YOLOv8 model is evaluated against SSD models, displaying better accuracy in detect...
详细信息
Toxic comments, such as hate speech and abuse, are a widespread issue online, disrupting healthy conversation and user safety. Identifying and filtering these comments is crucial for ensuring respectful online communi...
详细信息
Recognizing and reducing the risks presented by malevolent actors in the realm of cyber security requires an awareness of post exploitation techniques. However, deThe study investigates post operational challenges thr...
详细信息
As the cyber threats areevolving, intrusions exploit vulnerabilities in software or systems and can occur 24/7, targeting individuals and *** Intrusion detection system (IDS) is designed to help in the detection of cy...
详细信息
In the contemporary digital landscape, where online privacy and security face escalating challenges due to evolving cyber threats, this investigation uncovers vulnerabilities within traditional security measures. The ...
详细信息
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e...
详细信息
暂无评论