-
Article
Classifying informative tweets using feature enhanced pre-trained language model
Classifying tweets containing valuable information about COVID-19 is crucial for develo** monitoring systems that provide the latest updates. Existing approaches for informative tweet classification consider...
-
Article
A regularization based simple shallow perceptron network for detection of fake news in social networks
There is an ever-increasing number of public users of the internet just to remain learned and updated as well as distribute millions of posts, articles, and videos across platforms such as Twitter, Facebook an...
-
Article
An ensemble-based stegware detection system for information hiding malware attacks
Information hiding techniques like steganography are used by hackers to obfuscate malicious attack codes to carry malware scripts and deliver to crypto-miners in on-demand platforms like Cloud. Stegware is a t...
-
Chapter and Conference Paper
Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage
With the widespread cloud storage devices, most users store their data over cloud storage. A dishonest user might raise a false claim about the integrity of their data to get compensation. On the other hand, a...
-
Chapter and Conference Paper
Detection of Location of Audio-Stegware in LSB Audio Steganography
Steganography in malware, often known as stegomalware or stegware, is growing in popularity as attackers continue to show their versatility by inventing new tactics and re-inventing old ones in the quest to di...
-
Chapter and Conference Paper
SHLPM: Sentiment Analysis on Code-Mixed Data Using Summation of Hidden Layers of Pre-trained Model
Code-mixing refers to the blending of languages. The most serious issue with code-mixing is that people move between languages and type in English instead of transcribing words in Dravidian scripts. Traditiona...
-
Article
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT
Cloud-Assisted Internet of Things (IoT) has become an increasingly widespread technological trend that can significantly improve the performance of IoT applications by outsourcing massive data from IoT devices...
-
Article
Accident prevention and safety assistance using IOT and machine learning
Transportation is playing a vital role in our daily life and its development has made many of our chores much easier. But in recent years, driver drowsiness, distractions, and speed limit crossing cause ruinou...
-
Chapter and Conference Paper
Performance of Optimization Algorithms in Attention-Based Deep Learning Model for Fake News Detection System
Automatic fake news detection for categorizing the news as either fake or real is a complicated problem. Generally, the fake news does not fully contain false information. It is usually mixed with a substantia...
-
Chapter and Conference Paper
Identification of Online Auction Bidding Robots Using Machine Learning
aim of this project is to identify the bidding robots using machine learning, which bids in an online auction. Bidding robot is basically an application which helps to place a bid or click automatically on ...
-
Chapter and Conference Paper
Ensemble-Based Stegomalware Detection System for Hidden Ransomware Attack
Ransomware analysis creates crucial aspects for cybersecurity defense mechanisms. Recently, attackers are confusing the parts of ransomware attack code using steganography to carry malicious JavaScript and eve...
-
Article
QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks
Recent research in communication moves towards cyber space with modern applications such as multimedia surveillance, smart autonomous traffic control, advanced health care monitoring, industrial automation, an...
-
Chapter and Conference Paper
Automated Cyber Threat Intelligence Generation from Honeypot Data
The evolving of advance cyber threats requires the cyber security specialist and system analyst to detect, analyse and timely react against such kind of cyber attacks. In real practical scenario, the timely di...
-
Chapter and Conference Paper
Adaptive Threshold-Based Algorithm for Multi-objective VM Placement in Cloud Data Centers
Data is grown exponentially day by day which increases demand in cloud storage, leads to setting up a large number of cloud data centers. Such data centers employ an immense amount of electrical energy has end...