Advances in Computational Intelligence Systems
Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK
Article
Triple-negative breast cancer (TNBC) is a metastatic disease and a formidable treatment challenge as it does not respond to existing therapies. Epigenetic regulators play a crucial role in the progression and ...
Chapter and Conference Paper
Understanding the development and execution of a cyberattack is intrinsic in its prevention and mitigation. A suitable cyberattack analysis method can be utilised in analysing cyberattacks. However, not every ...
Chapter and Conference Paper
Machine learning has been constantly evolving and revolutionizing every aspect of our lives. There is ongoing research to enhance and modify machine learning models where scientists and researchers are finding...
Chapter and Conference Paper
A chatbot is one of the most innovative tools for interaction between humans and machines. It simulates human behaviour and interacts with a user in natural language to provide required information, services, ...
Chapter and Conference Paper
Cyberattacks are becoming more frequent and sophisticated which is a major concern for businesses and users. Several methods are available to analyse the risk of cyberattacks and determine what mitigations to ...
Chapter and Conference Paper
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals al...
Chapter and Conference Paper
The landscape of machine learning is changing rapidly due to the ever-evolving nature of data and devices. The large centralized data is replaced by the distributed data and a central server is replaced with a...
Chapter and Conference Paper
The production of chemicals is a complex task due to the highly nonlinear behaviour of chemical processes; therefore, traditional approaches may not be very effective in develo** or predicting such processes...
Book and Conference Proceedings
Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK
Article
Article
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-optimal for the detection of an unseen malicious pattern. In response, a number of studies attempt to empower a m...
Chapter and Conference Paper
Hybrid cloud infrastructure offers several benefits including high availability. However, one of the biggest challenges for the hybrid cloud infrastructure is to maintain the same high availability of the loca...
Chapter and Conference Paper
Big data necessitates the processing of data at scale and efficiency, which is beyond the capabilities of traditional IT infrastructure. Cloud-based big data processing platforms are the most efficient and est...
Article
The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to label fil...
Article
A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation....
Chapter and Conference Paper
Internet of Things (IoT) have demonstrated significant impact on all aspects of human daily lives due to their pervasive applications in areas such as telehealth, home appliances, surveillance, and wearable de...
Chapter and Conference Paper
Agile is a project management philosophy for collaborative working which consists of a set of values and principles that can be employed in any sector
Chapter and Conference Paper
The efficacious fuzzy rule based systems perform their tasks with either a dense rule base or a sparse ...