Skip to main content

previous disabled Page of 4
and
  1. Article

    Open Access

    LLM potentiality and awareness: a position paper from the perspective of trustworthy and responsible AI modeling

    Large language models (LLMs) are an exciting breakthrough in the rapidly growing field of artificial intelligence (AI), offering unparalleled potential in a variety of application domains such as finance, busi...

    Iqbal H. Sarker in Discover Artificial Intelligence (2024)

  2. Article

    Open Access

    Exploring post-COVID-19 health effects and features with advanced machine learning techniques

    COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recover...

    Muhammad Nazrul Islam, Md Shofiqul Islam, Nahid Hasan Shourav in Scientific Reports (2024)

  3. No Access

    Article

    A hybrid deep learning framework for daily living human activity recognition with cluster-based video summarization

    In assisted living facilities or nursing homes, residents’ movements or actions can be monitored using Human Activity Recognition (HAR), ensuring they receive proper care and attention. The significance of HAR...

    Shihab Hossain, Kaushik Deb, Saadman Sakib in Multimedia Tools and Applications (2024)

  4. Article

    Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques

    In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on ...

    Sumitra Das Guptta, Khandaker Tayef Shahriar, Hamed Alqahtani in Annals of Data Science (2024)

  5. No Access

    Article

    COVID-19 Fake News Detection using Deep Learning Model

    People may now receive and share information more quickly and easily than ever due to the widespread use of mobile networked devices. However, this can occasionally lead to the spread of false information. Suc...

    Mahabuba Akhter, Syed Md. Minhaz Hossain, Rizma Sijana Nigar in Annals of Data Science (2024)

  6. No Access

    Chapter

    AI-Enabled Cybersecurity for IoT and Smart City Applications

    AI-driven cybersecurity is crucial to enhancing the resilience of the Internet of Things (IoT) and smart city ecosystems. Due to the dynamic and heterogeneous nature of IoT devices, these interconnected networ...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  7. No Access

    Chapter

    AI for Critical Infrastructure Protection and Resilience

    This chapter explores how artificial intelligence (AI) can be used to enhance the protection and resilience of critical infrastructure. Society is becoming increasingly dependent on interconnected systems, whi...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  8. No Access

    Book

    AI-Driven Cybersecurity and Threat Intelligence

    Cyber Automation, Intelligent Decision-Making and Explainability

    Iqbal H. Sarker (2024)

  9. No Access

    Chapter

    Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle

    This chapter provides a foundational understanding of cybersecurity concepts, including terminologies and attack frameworks like the cyber kill chain and MITRE ATT&CK, as well as the cybersecurity life cycle. ...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  10. No Access

    Chapter

    Detecting Anomalies and Multi-attacks Through Cyber Learning: An Experimental Analysis

    Detecting cyber-anomalies and attacks are becoming a rising concern these days in the domain of cybersecurity. The knowledge of artificial intelligence (AI), particularly the machine learning techniques, can b...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  11. No Access

    Chapter

    Cybersecurity Data Science: Toward Advanced Analytics, Knowledge, and Rule Discovery for Explainable AI Modeling

    In a computing context, cybersecurity technology and operations are constantly changing, and data science is driving the change. Building a data-driven model that extracts patterns in cybersecurity incidents i...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  12. No Access

    Chapter

    AI for Enhancing ICS/OT Cybersecurity

    In today’s industrial environments, advanced technologies have become increasingly integrated, increasing vulnerabilities and risks related to cyber threats. This chapter explores the transformative role of ar...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  13. No Access

    Chapter and Conference Paper

    Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper

    As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend ...

    Iqbal H. Sarker, Helge Janicke in Advanced Research in Technologies, Informa… (2024)

  14. No Access

    Chapter

    CyberAI: A Comprehensive Summary of AI Variants, Explainable and Responsible AI for Cybersecurity

    The integration of cybersecurity and artificial intelligence (AI), referred to as “CyberAI,” represents a dynamic and transformative landscape. This chapter outlines the diverse landscape of AI variants, as we...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  15. No Access

    Chapter

    Introduction to AI-Driven Cybersecurity and Threat Intelligence

    With the convergence of artificial intelligence (AI) and cybersecurity, a new paradigm has emerged in how we defend against evolving digital threats. This book explores the dynamic landscape of AI-driven cyber...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  16. No Access

    Chapter

    Learning Technologies: Toward Machine Learning and Deep Learning for Cybersecurity

    This chapter explores the transformative landscape of learning technologies, focusing specifically on machine learning and deep learning techniques used in cybersecurity. As digital threats become increasingly...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  17. No Access

    Chapter

    Generative AI and Large Language Modeling in Cybersecurity

    Cybersecurity is encountering new challenges demanding innovative solutions due to the complexity and frequency of cyberattacks progressing. Artificial intelligence (AI), particularly generative AI, has emerge...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  18. Article

    Open Access

    Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects

    Due to the digitization and Internet of Things revolutions, the present electronic world has a wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a growing concern in t...

    Iqbal H. Sarker in Annals of Data Science (2023)

  19. No Access

    Article

    A Machine Learning Model for Predicting Individual Substance Abuse with Associated Risk-Factors

    Substance abuse is the unrestrained and detrimental use of psychoactive chemical substances, unauthorized drugs, and alcohol that can ultimately lead a human to disastrous consequences. As patients with this b...

    Uwaise Ibna Islam, Enamul Haque, Dheyaaldin Alsalman in Annals of Data Science (2023)

  20. Article

    CovTiNet: Covid text identification network using attention-based positional embedding feature fusion

    Covid text identification (CTI) is a crucial research concern in natural language processing (NLP). Social and electronic media are simultaneously adding a large volume of Covid-affiliated text on the World Wi...

    Md. Rajib Hossain, Mohammed Moshiul Hoque in Neural Computing and Applications (2023)

previous disabled Page of 4