Works matching IS 27697851 AND DT 2025 AND VI 15 AND IP 1
Results: 30
Unveiling the Hidden: Exploring Challenges in Dark Web Investigation Using Measurement Sensors.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 166, doi. 10.54216/JCIM.150113
- By:
- Publication type:
- Article
Optimizing Task Offloading in Vehicular Network (OTO): A Game Theory Approach Integrating Hybrid Edge and Cloud Computing.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 115, doi. 10.54216/JCIM.150110
- By:
- Publication type:
- Article
Optimized and Comprehensive Fake Review Detection based on Harris Hawks optimization integrated with Machine Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 11, doi. 10.54216/JCIM.150102
- By:
- Publication type:
- Article
Biometrics Applied to Forensics Exploring New Frontiers in Criminal Identification.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 277, doi. 10.54216/JCIM.150122
- By:
- Publication type:
- Article
A Hybrid Intelligence-based Deep Learning Model with Reptile Search Algorithm for Effective Channel Estimation in massive MIMO Communication Systems.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 211, doi. 10.54216/JCIM.150116
- By:
- Publication type:
- Article
Enhancing Network Congestion Control: A Comparative Study of Traditional and AI-Enhanced Active Queue Management Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 179, doi. 10.54216/JCIM.150114
- By:
- Publication type:
- Article
TBBS-TO: Trustable Blockchain and Bandwidth Sensible-based Task Offloading and Resource Allocation in Cloud-IoT Network.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 133, doi. 10.54216/JCIM.150111
- By:
- Publication type:
- Article
A Multiclass Attack Classification Framework for IoT Using Hybrid Deep Learning Model.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 151, doi. 10.54216/JCIM.150112
- By:
- Publication type:
- Article
Enhancing Cybersecurity: Detecting Hidden Information in Spatial Domain Images Using Convolutional Neural Networks.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 1, doi. 10.54216/JCIM.150101
- By:
- Publication type:
- Article
Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 244, doi. 10.54216/JCIM.150119
- By:
- Publication type:
- Article
HEART SAVIOUR: A Dense Network Four Way Transformer Network for Remote Heart Disease Monitoring using Medical Sensors for Blockchain Cloud Assisted Healthcare.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 101, doi. 10.54216/JCIM.150109
- By:
- Publication type:
- Article
An Intelligent IDS for Mobile Adhoc Networks using Differential Evolutionary and Navie Bayesin Algorithms.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 50, doi. 10.54216/JCIM.150105
- By:
- Publication type:
- Article
Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 62, doi. 10.54216/JCIM.150106
- By:
- Publication type:
- Article
Improved Security in Cloud Computer Networks Using RNN Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 365, doi. 10.54216/JCIM.150129
- By:
- Publication type:
- Article
A Hybrid Temporal Lambda Layer Embedded in Autoencoder Neural Network for Fake News Detection.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 298, doi. 10.54216/JCIM.150124
- By:
- Publication type:
- Article
A Public Key Infrastructure Based on Blockchain for IoT-Based Healthcare Systems.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 233, doi. 10.54216/JCIM.150118
- By:
- Publication type:
- Article
Modelling a Dense Convolutional Model for Crop Yield Prediction Using Kernel Computation.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 89, doi. 10.54216/JCIM.150108
- By:
- Publication type:
- Article
Detecting Zero-day Polymorphic Worms Using Honeywall.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 34, doi. 10.54216/JCIM.150104
- By:
- Publication type:
- Article
Transfer Learning Models for E-mail Classification.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 342, doi. 10.54216/JCIM.150127
- By:
- Publication type:
- Article
The Impact of Cloud Computing on Network Security Risk for Organization Behaviours.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 270, doi. 10.54216/JCIM.150121
- By:
- Publication type:
- Article
Anomaly Detection Improvement in Computer Communication Networks using Machine Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 251, doi. 10.54216/JCIM.150120
- By:
- Publication type:
- Article
Enhancing Anomaly Detection in Industrial Control Systems through Supervised Learning and Explainable Artificial Intelligence.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 314, doi. 10.54216/JCIM.150125
- By:
- Publication type:
- Article
The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 288, doi. 10.54216/JCIM.150123
- By:
- Publication type:
- Article
Digital Forensic Investigation of an Unmanned Aerial Vehicle (UAV): A Technical Case Study of a DJI Phantom III Professional Drone.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 197, doi. 10.54216/JCIM.150115
- By:
- Publication type:
- Article
A Novel Authentication Mechanism with Efficient Mathematic Based Technique.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 77, doi. 10.54216/JCIM.150107
- By:
- Publication type:
- Article
FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 352, doi. 10.54216/JCIM.150128
- By:
- Publication type:
- Article
E-mail Classifications Based on Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 385, doi. 10.54216/JCIM.150130
- By:
- Publication type:
- Article
Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 332, doi. 10.54216/JCIM.150126
- By:
- Publication type:
- Article
A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 225, doi. 10.54216/JCIM.150117
- By:
- Publication type:
- Article
AFCP Data Security Model for EHR Data Using Blockchain.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 22, doi. 10.54216/JCIM.150103
- By:
- Publication type:
- Article