-
1
-
2
Automatic detection of data manipulation in power systems
منشور في 2019احصل على النص الكامل
doctoralThesis -
3
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…However, unsupervised data mining techniques are reliable in detecting fraud before they happen. …"
احصل على النص الكامل
-
4
-
5
Detecting Code Smells
منشور في 2024احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
6
Network Packet Transformation Approaches for Intrusion Detection Systems: A Survey
منشور في 2025"…While machine learning and deep learning techniques hold significant promise for enhancing these systems, their performance is highly dependent on how network traffic data is transformed and represented. …"
-
7
-
8
-
9
Anomalies Detection in Software by Conceptual Learning From Normal Executions
منشور في 2020"…<p>Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? …"
-
10
Using XAI Techniques to Detect Targeted Data Poisoning Attacks on Healthcare Applications of Machine Learning Systems
منشور في 2025"…This research study explores the application of Explainable Artificial Intelligence (XAI) methods for detecting targeted data poisoning attacks in healthcare machine learning systems. …"
احصل على النص الكامل
-
11
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
منشور في 2023"…In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. …"
-
12
-
13
Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges
منشور في 2024"…Therefore, new techniques and technical solutions for disease management in aquaculture are required. In this context, data analytics technologies, such as internet of things (IoT) sensors, artificial intelligence, and machine learning, allow farmers to proactively monitor their farms and detect potential disease outbreaks before they strike. …"
-
14
-
15
How effective are synthetic attack models to detect real-world energy theft?
منشور في 2025"…However, available datasets lack annotated real anomalies, which poses significant challenges in developing effective detection systems. …"
-
16
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
منشور في 2019"…This poses some problems for the large volume data and hinders the scalability of any detection system. …"
-
17
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
منشور في 2024"…This paper introduces PermGuard, a scalable framework for Android malware detection that maps permissions into exploitation techniques and employs incremental learning to detect malicious apps. …"
-
18
Deep learning-based marine big data fusion for ocean environment monitoring: Towards shape optimization and salient objects detection
منشور في 2023"…This research study presents a data fusion-based method for underwater salient object detection and ocean environment monitoring by utilizing a deep model.…"
-
19
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
منشور في 2024"…These attacks can be detected using both traditional and modern AI-based models. …"
-
20