A metaheuristic optimisation-based deep learning model for fake news detection in online social networks
The spread of fake news has become a societal problem. Most often, fake news spreads faster than real news and misleads society. Many works have been proposed in the literature using machine learning techniques to detect fake news, but developing a ...
Legal regulation of impersonation through websites
The worldwide use of the internet has had serious consequences in many areas of life, including its impact on the prevalence of crime, especially crimes against women, of which threats are the most notable. Electronic impersonation of character and ...
Cryptography in the cloud: securing cloud data with encryption
Cloud computing utilises dispersed networks to provide computational and storage capacities. It is a kind of efficient technology that is geared specifically for the field of information technology. The use of the Internet has made both accessing data ...
Machine learning models for enhancing cyber security
Because networks are having an ever-increasing impact on contemporary life, cybersecurity has become an increasingly essential area of research. Virus protection, firewalls, intrusion detection systems, and other related technologies are the primary ...
Network security intrusion target detection system in the cloud
Cloud computing is a new field that uses the internet to give users on-demand access to a variety of computer resources and services. The framework established in this research project is to maximise the efficiency of security mechanisms deployed in CC ...
Adversarial attack model based on deep neural network interpretability and artificial fish swarm algorithm
In order to solve the problem of model information leakage caused by the interpretability in deep neural network (DNN), the feasibility of using the Grad-CAM interpretation method to generate admissible samples in the white box environment is proved, and ...
Comprehensive review of emerging cybersecurity trends and developments
Pakistan views cyberspace as a critical source of power in the twenty-first century when governments no longer have complete control over power games. Private entities, terrorist groups, criminals, and people, on the other hand, are prominent players in ...
A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning
Support ticket systems have gained popularity as a result of the increase in the use of virtual systems. Since new team members are typically hired during the course of a project, they must be familiar with the features that have already been implemented ...