![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessD2TS: a dual diversity tree selection approach to pruning of random forests
Random Forest is one of the most effective classification techniques. It is an ensemble technique with typically decision trees as its classifiers. Each tree votes for an outcome when a new instance is being c...
-
Chapter and Conference Paper
Android Malware Detection Using Control Flow Graphs and Text Analysis
The Android OS has a massive user-base with hundreds of millions of devices. Due to the growth of this platform, an increasing number of malicious applications are becoming available to download online. We pro...
-
Chapter and Conference Paper
Transformer-Encoder Generated Context-Aware Embeddings for Spell Correction
In this paper, we propose a novel approach for context-aware spell correction in text documents. We present a deep learning model that learns a context-aware character-level map** of words to a compact embed...
-
Chapter and Conference Paper
DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection
DroidDissector is an extraction tool for both static and dynamic features. The aim is to provide Android malware researchers and analysts with an integrated tool that can extract all of the most widely used fe...
-
Chapter and Conference Paper
NTFA: Network Flow Aggregator
Network intrusion detection systems (NIDS) play a vital role in defending against cybersecurity threats. One effective way of detecting attacks is to analyse their footprint on the network traffic logs. Flow-b...
-
Book and Conference Proceedings
-
Chapter and Conference Paper
Assessment of Pharmaceutical Patent Novelty with Siamese Neural Networks
Patents in the pharmaceutical field fulfil an important role as they contain details of the final product that is the culmination of years of research and possibly millions of dollars of investment. It is cruc...
-
Chapter and Conference Paper
Availability in Openstack: The Bunny that Killed the Cloud
The use of cloud is on the rise and is forecast to keep increasing exponentially in the coming years. Openstack is one of the major contributors to the cloud space and there are lot of providers using Openstac...
-
Chapter and Conference Paper
Android Malware Detection Using API Calls: A Comparison of Feature Selection and Machine Learning Models
Android has become a major target for malware attacks due its popularity and ease of distribution of applications. According to a recent study, around 11,000 new malware appear online on daily basis. Machine l...
-
Article
Optimal Placement of Near Ground VHF/UHF Radio Communication Network as a Multi Objective Problem
Ultra high frequency (UHF) and very high frequency (VHF) bands are widely used with near ground applications especially for communication purposes. However, due to the limited antenna height, the VHF/UHF signa...
-
Article
A self-managing volatile key scheme for wireless sensor networks
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with lim...
-
Article
Open AccessA key management scheme evaluation using Markov processes
Content access control aims at ensuring that, in a system with several resources, users can only access resources they are authorized to. Resources are encrypted using cryptographic keys. Generating, distribut...