264 related articles for article (PubMed ID: 32411955)
1. Diverging deep learning cognitive computing techniques into cyber forensics.
Karie NM; Kebande VR; Venter HS
Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
[TBL] [Abstract][Full Text] [Related]
2. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
Yadav A; Kumar A; Singh V
Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
[TBL] [Abstract][Full Text] [Related]
3. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
Array (N Y); 2020; 5():. PubMed ID: 35531088
[TBL] [Abstract][Full Text] [Related]
4. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.
Kim K; Alshenaifi IM; Ramachandran S; Kim J; Zia T; Almorjan A
Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050740
[TBL] [Abstract][Full Text] [Related]
5. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
Djenna A; Barka E; Benchikh A; Khadir K
Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
[TBL] [Abstract][Full Text] [Related]
6. Cyber-attack method and perpetrator prediction using machine learning algorithms.
Bilen A; Özer AB
PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
[TBL] [Abstract][Full Text] [Related]
7. Advancing Coordinated Cyber-investigations and Tool Interoperability using a Community Developed Specification Language.
Casey E; Barnum S; Griffith R; Snyder J; van Beek H; Nelson A
Digit Investig; 2017; 22():. PubMed ID: 31579279
[TBL] [Abstract][Full Text] [Related]
8. Game-Theoretic Decision Support for Cyber Forensic Investigations.
Nisioti A; Loukas G; Rass S; Panaousis E
Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
[TBL] [Abstract][Full Text] [Related]
9. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.
Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S
Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527
[TBL] [Abstract][Full Text] [Related]
10. In-Vehicle Communication Cyber Security: Challenges and Solutions.
Rathore RS; Hewage C; Kaiwartya O; Lloret J
Sensors (Basel); 2022 Sep; 22(17):. PubMed ID: 36081138
[TBL] [Abstract][Full Text] [Related]
11. Security risk models against attacks in smart grid using big data and artificial intelligence.
Yasin Ghadi Y; Mazhar T; Aurangzeb K; Haq I; Shahzad T; Ali Laghari A; Shahid Anwar M
PeerJ Comput Sci; 2024; 10():e1840. PubMed ID: 38686008
[TBL] [Abstract][Full Text] [Related]
12. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.
Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D
Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051
[TBL] [Abstract][Full Text] [Related]
13. A systematic review of literature on credit card cyber fraud detection using machine and deep learning.
Marazqah Btoush EAL; Zhou X; Gururajan R; Chan KC; Genrich R; Sankaran P
PeerJ Comput Sci; 2023; 9():e1278. PubMed ID: 37346569
[TBL] [Abstract][Full Text] [Related]
14. A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks.
Gupta C; Johri I; Srinivasan K; Hu YC; Qaisar SM; Huang KY
Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271163
[TBL] [Abstract][Full Text] [Related]
15. Deep Reinforcement Learning for Cyber Security.
Nguyen TT; Reddi VJ
IEEE Trans Neural Netw Learn Syst; 2023 Aug; 34(8):3779-3795. PubMed ID: 34723814
[TBL] [Abstract][Full Text] [Related]
16. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
Alzubaidi A
Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
[TBL] [Abstract][Full Text] [Related]
17. Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
Oh SH; Jeong MK; Kim HC; Park J
Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991711
[TBL] [Abstract][Full Text] [Related]
18. COVID-19 malicious domain names classification.
Mvula PK; Branco P; Jourdan GV; Viktor HL
Expert Syst Appl; 2022 Oct; 204():117553. PubMed ID: 35611122
[TBL] [Abstract][Full Text] [Related]
19. An overview of cybercrime law in South Africa.
Snail Ka Mtuze S; Musoni M
Int Cybersecur Law Rev; 2023 Jun; ():1-25. PubMed ID: 37361908
[TBL] [Abstract][Full Text] [Related]
20.
; ; . PubMed ID:
[No Abstract] [Full Text] [Related]
[Next] [New Search]