Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 16, Issue 52024
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1751-911X
EISSN:1751-9128
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
A metaheuristic optimisation-based deep learning model for fake news detection in online social networks

The spread of fake news has become a societal problem. Most often, fake news spreads faster than real news and misleads society. Many works have been proposed in the literature using machine learning techniques to detect fake news, but developing a ...

research-article
Legal regulation of impersonation through websites

The worldwide use of the internet has had serious consequences in many areas of life, including its impact on the prevalence of crime, especially crimes against women, of which threats are the most notable. Electronic impersonation of character and ...

research-article
Cryptography in the cloud: securing cloud data with encryption

Cloud computing utilises dispersed networks to provide computational and storage capacities. It is a kind of efficient technology that is geared specifically for the field of information technology. The use of the Internet has made both accessing data ...

research-article
Machine learning models for enhancing cyber security

Because networks are having an ever-increasing impact on contemporary life, cybersecurity has become an increasingly essential area of research. Virus protection, firewalls, intrusion detection systems, and other related technologies are the primary ...

research-article
Network security intrusion target detection system in the cloud

Cloud computing is a new field that uses the internet to give users on-demand access to a variety of computer resources and services. The framework established in this research project is to maximise the efficiency of security mechanisms deployed in CC ...

research-article
Adversarial attack model based on deep neural network interpretability and artificial fish swarm algorithm

In order to solve the problem of model information leakage caused by the interpretability in deep neural network (DNN), the feasibility of using the Grad-CAM interpretation method to generate admissible samples in the white box environment is proved, and ...

research-article
Comprehensive review of emerging cybersecurity trends and developments

Pakistan views cyberspace as a critical source of power in the twenty-first century when governments no longer have complete control over power games. Private entities, terrorist groups, criminals, and people, on the other hand, are prominent players in ...

research-article
A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning

Support ticket systems have gained popularity as a result of the increase in the use of virtual systems. Since new team members are typically hired during the course of a project, they must be familiar with the features that have already been implemented ...

Comments