Works matching IS 20749090 AND DT 2025 AND VI 17 AND IP 1
Results: 8
Recognizing Fakes, Propaganda and Disinformation in Ukrainian Content based on NLP and Machine-learning Technology.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 92, doi. 10.5815/ijcnis.2025.01.08
- By:
- Publication type:
- Article
Modified CNN Model for Network Intrusion Detection and Classification System Using Local Outlier Factor-based Recursive Feature Elimination.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 82, doi. 10.5815/ijcnis.2025.01.07
- By:
- Publication type:
- Article
Efficient Resource Allocation to Enhance the Quality of Service in Cloud Computing.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 68, doi. 10.5815/ijcnis.2025.01.06
- By:
- Publication type:
- Article
Vowel based Speech Watermarking Techniques using FFT and Min Algorithm.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 57, doi. 10.5815/ijcnis.2025.01.05
- By:
- Publication type:
- Article
Enhancing Web Security through Machine Learning-based Detection of Phishing Websites.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 39, doi. 10.5815/ijcnis.2025.01.04
- By:
- Publication type:
- Article
Investigating the Feasibility of Elementary Cellular Automata based Scrambling for Image Encryption.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 28, doi. 10.5815/ijcnis.2025.01.03
- By:
- Publication type:
- Article
Implementation and Performance Comparison of Novel Optimization Approaches to Counter Starvation in Wireless Networks.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 17, doi. 10.5815/ijcnis.2025.01.02
- By:
- Publication type:
- Article
Enhancing Adversarial Examples for Evading Malware Detection Systems: A Memetic Algorithm Approach.
- Published in:
- International Journal of Computer Network & Information Security, 2025, v. 17, n. 1, p. 1, doi. 10.5815/ijcnis.2025.01.01
- By:
- Publication type:
- Article