


default search action
1st ICAIC 2022: Victoria, TX, USA
- 1st International Conference on AI in Cybersecurity, ICAIC 2022, Victoria, TX, USA, May 24-26, 2022. IEEE 2022, ISBN 978-1-6654-0043-5

- Sayan Biswas:

Stock Price Prediction using Bidirectional LSTM with Attention. 1-5 - Richard Farrell

, Xiaohong Yuan, Kaushik Roy:
IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework. 1-6 - Alex Sumner, Jinsheng Xu

, Xiaohong Yuan:
Determining Phishing Emails using URL Domain Features. 1-5 - Godwyll Aikins

, Sagar Jagtap, Weinan Gao:
Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations Against Cyberattacks. 1-6 - Taher M. Ghazal, Mohammad Kamrul Hasan, Haitham M. Alzoubi, Mohammed Al Hmmadi, Nidal A. Al-Dmour

, Shayla Islam, Rukshanda Kamran
, Beenu Mago:
Securing Smart Cities Using Blockchain Technology. 1-4 - Taher M. Ghazal, Mohammad Kamrul Hasan, Raed Abu Zitar

, Nidal A. Al-Dmour
, Waleed T. Al-Sit, Shayla Islam:
Cybers Security Analysis and Measurement Tools Using Machine Learning Approach. 1-4 - Salomon Ebi Esono Avomo, Abdul Samad Shibghatullah, Joseph Ng Poh Soon:

Online Booking Sports Facilities in the Republic of Equatorial Guinea. 1-5 - Kay Hooi Keoy

, Yung Jing Koh
, Su Mon Chit, Khalid Hafeez, Luqman Lee
, Chee Ling Thong:
Impact of Assisted Technological Enablement on Entrepreneurial Success among Malaysian Higher Education Students. 1-7 - Nana Kwame Gyamfi

, Dainius Ceponis, Nikolaj Goranin
:
Automated System-Level Anomaly Detection and Classification Using Modified Random Forest. 1-8 - Adnan Tajul Islam Mazumdar, Shayla Islam, Chee Ling Thong, Kay Hooi Keoy

:
NFC-based Mobile Application for Student Attendance in Institution of Higher Learning. 1-5 - Zheni Utic, Kandethody Ramachandran:

A Survey of Reinforcement Learning in Intrusion Detection. 1-8 - Rajeev Kumar Shah

, Mohammad Kamrul Hasan, Shayla Islam, Asif Khan, Taher M. Ghazal, Ahmad Neyaz Khan:
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making. 1-8 - Ng Shao Tong, Abdul Samad Shibghatullah, Kasthuri Subaramaniam:

An Online Seafood Store Management System in Malaysia. 1-5 - Haitham M. Alzoubi, Taher M. Ghazal, Mohammad Kamrul Hasan, Asma Alketbi, Rukshanda Kamran

, Nidal A. Al-Dmour
, Shayla Islam:
Cyber Security Threats on Digital Banking. 1-4 - Salman Hanif, Dong Mu, Noman Hanif, Sana Hanif, Tayyaba Hanif, Omer Hanif:

The Dynamic Influence of ICT on Modern Logistic Industry in Developing Economy and CO2 Emission Using ARDL Approach: A Case of Pakistan. 1-6 - Sandeep Shah, Xiaohong Yuan, Zanetta Tyler:

An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms. 1-6 - M. Atanasio, Abdul Samad Shibghatullah, Shayla Islam:

Developing A Mobile Application for Fleet Vehicle Tracking. 1-5 - Joon Sern Lee, Kai Keng Tay

, Zong Fu Chua:
BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec. 1-6 - Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib:

A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. 1-8 - Bishwajeet Pandey, Tanisq Kala, Naman Bhoj, Hardik A. Gohel, Abhay Kumar

, P. Sivaram
:
Effective Identification of Spam Jobs Postings Using Employer Defined Linguistic Feature. 1-6 - Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, Sule Yildirim Yayilgan

:
Analysing digital evidence towards enhancing healthcare security practice: The KID model. 1-9 - Muhammad Zain Malik, Sulaiman Khan

, Habib Ullah Khan
:
Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: A Systemic Literture Review of Busniess Sectors. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














