Skip to main content

and
  1. Article

    Open Access

    Apigenin and its combination with Vorinostat induces apoptotic-mediated cell death in TNBC by modulating the epigenetic and apoptotic regulators and related miRNAs

    Triple-negative breast cancer (TNBC) is a metastatic disease and a formidable treatment challenge as it does not respond to existing therapies. Epigenetic regulators play a crucial role in the progression and ...

    Snehal Nimal, Navanath Kumbhar, Saruchi, Shriya Rathore, Nitin Naik in Scientific Reports (2024)

  2. No Access

    Chapter and Conference Paper

    Analysing Cyberattacks Using Attack Tree and Fuzzy Rules

    Understanding the development and execution of a cyberattack is intrinsic in its prevention and mitigation. A suitable cyberattack analysis method can be utilised in analysing cyberattacks. However, not every ...

    Nitin Naik, Paul Jenkins, Paul Grace in Advances in Computational Intelligence Sys… (2024)

  3. No Access

    Chapter and Conference Paper

    An Introduction to Federated Learning: Working, Types, Benefits and Limitations

    Machine learning has been constantly evolving and revolutionizing every aspect of our lives. There is ongoing research to enhance and modify machine learning models where scientists and researchers are finding...

    Dishita Naik, Nitin Naik in Advances in Computational Intelligence Systems (2024)

  4. No Access

    Chapter and Conference Paper

    Demystifying the Working, Types, Benefits and Limitations of Chatbots

    A chatbot is one of the most innovative tools for interaction between humans and machines. It simulates human behaviour and interacts with a user in natural language to provide required information, services, ...

    Ishita Naik, Dishita Naik, Nitin Naik in Advances in Computational Intelligence Systems (2024)

  5. No Access

    Chapter and Conference Paper

    Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack

    Cyberattacks are becoming more frequent and sophisticated which is a major concern for businesses and users. Several methods are available to analyse the risk of cyberattacks and determine what mitigations to ...

    Nitin Naik, Paul Jenkins, Paul Grace in Advances in Computational Intelligence Systems (2024)

  6. No Access

    Chapter and Conference Paper

    Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

    As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals al...

    Nitin Naik, Paul Jenkins, Paul Grace in Advances in Computational Intelligence Sys… (2024)

  7. No Access

    Chapter and Conference Paper

    The Changing Landscape of Machine Learning: A Comparative Analysis of Centralized Machine Learning, Distributed Machine Learning and Federated Machine Learning

    The landscape of machine learning is changing rapidly due to the ever-evolving nature of data and devices. The large centralized data is replaced by the distributed data and a central server is replaced with a...

    Dishita Naik, Nitin Naik in Advances in Computational Intelligence Systems (2024)

  8. No Access

    Chapter and Conference Paper

    Artificial Intelligence (AI) Applications in Chemistry

    The production of chemicals is a complex task due to the highly nonlinear behaviour of chemical processes; therefore, traditional approaches may not be very effective in develo** or predicting such processes...

    Ishita Naik, Dishita Naik, Nitin Naik in Advances in Computational Intelligence Systems (2024)

  9. No Access

    Book and Conference Proceedings

    Advances in Computational Intelligence Systems

    Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK

    Nitin Naik, Paul Jenkins, Paul Grace in Advances in Intelligent Systems and Computing (2024)

  10. Article

    Special issue on emerging trends, challenges and applications in cloud computing

    Longzhi Yang, Vijayakumar Varadarajan, Tossapon Boongoen, Nitin Naik in Wireless Networks (2023)

  11. Article

    Open Access

    Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem

    Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-optimal for the detection of an unseen malicious pattern. In response, a number of studies attempt to empower a m...

    Chutipon Pimsarn, Tossapon Boongoen, Natthakan Iam-On in Complex & Intelligent Systems (2022)

  12. No Access

    Chapter and Conference Paper

    Fuzzy Intelligent System for Improving High Availability of a Docker-Based Hybrid Cloud Infrastructure

    Hybrid cloud infrastructure offers several benefits including high availability. However, one of the biggest challenges for the hybrid cloud infrastructure is to maintain the same high availability of the loca...

    Nitin Naik in Advances in Computational Intelligence Systems (2022)

  13. No Access

    Chapter and Conference Paper

    Cloud-Agnostic and Lightweight Big Data Processing Platform in Multiple Clouds Using Docker Swarm and Terraform

    Big data necessitates the processing of data at scale and efficiency, which is beyond the capabilities of traditional IT infrastructure. Cloud-based big data processing platforms are the most efficient and est...

    Nitin Naik in Advances in Computational Intelligence Systems (2022)

  14. Article

    Open Access

    Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis

    The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to label fil...

    Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang in Complex & Intelligent Systems (2021)

  15. Article

    Open Access

    A computational intelligence enabled honeypot for chasing ghosts in the wires

    A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation....

    Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang in Complex & Intelligent Systems (2021)

  16. No Access

    Chapter and Conference Paper

    Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System

    Internet of Things (IoT) have demonstrated significant impact on all aspects of human daily lives due to their pervasive applications in areas such as telehealth, home appliances, surveillance, and wearable de...

    Noe Elisa, Longzhi Yang, Fei Chao in Proceedings of the 12th International Conf… (2021)

  17. No Access

    Chapter and Conference Paper

    Learning Agile Scrum Methodology Using the Groupware Tool Trello \(^{\textregistered }\) Through Collaborative Working

    Agile is a project management philosophy for collaborative working which consists of a set of values and principles that can be employed in any sector

    Nitin Naik, Paul Jenkins, David Newell in Complex, Intelligent, and Software Intensi… (2020)

  18. No Access

    Chapter and Conference Paper

    Integration of Interpolation and Inference with Multi-antecedent Rules

    The efficacious fuzzy rule based systems perform their tasks with either a dense rule base or a sparse ...

    Nitin Naik, Qiang Shen in Advances in Computational Intelligence Systems (2020)