Journal articles on the topic 'Prediction of attacks in wild'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Prediction of attacks in wild.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bilen, Abdulkadir, and Ahmet Bedri Özer. "Cyber-attack method and perpetrator prediction using machine learning algorithms." PeerJ Computer Science 7 (April 9, 2021): e475. http://dx.doi.org/10.7717/peerj-cs.475.
Full textSiswanto, Joko, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Number of Cyber Attacks Predicted With Deep Learning Based LSTM Model." JUITA : Jurnal Informatika 12, no. 1 (2024): 39. http://dx.doi.org/10.30595/juita.v12i1.20210.
Full textZuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Full textKadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.
Full textLi, Zhong, Xianke Wu, and Changjun Jiang. "Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems." Security and Safety 1 (2022): 2022003. http://dx.doi.org/10.1051/sands/2022003.
Full textRuda, Aleš, Jaromír Kolejka, and Thakur Silwal. "GIS-Assisted Prediction and Risk Zonation of Wildlife Attacks in the Chitwan National Park in Nepal." ISPRS International Journal of Geo-Information 7, no. 9 (2018): 369. http://dx.doi.org/10.3390/ijgi7090369.
Full textYuan, Guotao, Hong Huang, and Xin Li. "Self-supervised learning backdoor defense mixed with self-attention mechanism." Journal of Computing and Electronic Information Management 12, no. 2 (2024): 81–88. http://dx.doi.org/10.54097/7hx9afkw.
Full textHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Full textTibble, Holly, Athanasios Tsanas, Elsie Horne, et al. "Predicting asthma attacks in primary care: protocol for developing a machine learning-based prediction model." BMJ Open 9, no. 7 (2019): e028375. http://dx.doi.org/10.1136/bmjopen-2018-028375.
Full textGazzan, Mazen, and Frederick T. Sheldon. "Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems." Future Internet 15, no. 4 (2023): 144. http://dx.doi.org/10.3390/fi15040144.
Full textHe, Yuxiang, Baisong Yang, and Chiawei Chu. "GA-CatBoost-Weight Algorithm for Predicting Casualties in Terrorist Attacks: Addressing Data Imbalance and Enhancing Performance." Mathematics 12, no. 6 (2024): 818. http://dx.doi.org/10.3390/math12060818.
Full textTasneem, Sumaiya, and Kazi Aminul Islam. "Improve Adversarial Robustness of AI Models in Remote Sensing via Data-Augmentation and Explainable-AI Methods." Remote Sensing 16, no. 17 (2024): 3210. http://dx.doi.org/10.3390/rs16173210.
Full textXiang, Yingxiao, Wenjia Niu, Endong Tong, et al. "Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods." Security and Communication Networks 2021 (October 31, 2021): 1–17. http://dx.doi.org/10.1155/2021/1632825.
Full textPhillips, Peter J., and Gabriela Pohl. "The Deferral of Attacks: SP/A Theory as a Model of Terrorist Choice when Losses Are Inevitable." Open Economics 1, no. 1 (2018): 71–85. http://dx.doi.org/10.1515/openec-2018-0001.
Full textChan, Amy Hai Yan, Braden Te Ao, Christina Baggott, et al. "DIGIPREDICT: physiological, behavioural and environmental predictors of asthma attacks—a prospective observational study using digital markers and artificial intelligence—study protocol." BMJ Open Respiratory Research 11, no. 1 (2024): e002275. http://dx.doi.org/10.1136/bmjresp-2023-002275.
Full textTudu, Debananda, and Bana Bihari Mishra. "Prediction of difficult cholecystectomy, a study of 100 cases." International Journal of Research in Medical Sciences 7, no. 1 (2018): 63. http://dx.doi.org/10.18203/2320-6012.ijrms20185364.
Full textKosmacheva, I. M., N. V. Davidyuk, SV Belov, et al. "Predicting of cyber attacks on critical information infrastructure." Journal of Physics: Conference Series 2091, no. 1 (2021): 012062. http://dx.doi.org/10.1088/1742-6596/2091/1/012062.
Full textAkinyelu, Andronicus A., and Aderemi O. Adewumi. "Classification of Phishing Email Using Random Forest Machine Learning Technique." Journal of Applied Mathematics 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/425731.
Full textKumar, Prashant, Chitra Kushwaha, Dimple Sethi, Debjani Ghosh, Punit Gupta, and Ankit Vidyarthi. "Investigating the performance of multivariate LSTM models to predict the occurrence of Distributed Denial of Service (DDoS) attack." PLOS ONE 20, no. 1 (2025): e0313930. https://doi.org/10.1371/journal.pone.0313930.
Full textQin, Shanshan, Chuyu Chen, and Ming Zhang. "Modeling of Concrete Deterioration under External Sulfate Attack and Drying–Wetting Cycles: A Review." Materials 17, no. 13 (2024): 3334. http://dx.doi.org/10.3390/ma17133334.
Full textAtchuta, Ramya, Praturi Akshara Sahithi Sruthi, Dharani Neelam, Pati Janardhan Babu, Putchakayala Sankeerth, and Pappala Vijay Kumar. "Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks." International Journal of All Research Education and Scientific Methods 13, no. 02 (2025): 1573–82. https://doi.org/10.56025/ijaresm.2025.1302251573.
Full textBonde, Lossan, and Severin Dembele. "High Accuracy Location Information Extraction From Social Network Texts Using Natural Language Processing." International Journal on Natural Language Computing 12, no. 4 (2023): 01–12. http://dx.doi.org/10.5121/ijnlc.2023.12401.
Full textLossan, Bonde, and Dembele Severin. "High Accuracy Location Information Extraction From Social Network Texts Using Natural Language Processing." International Journal on Natural Language Computing (IJNLC) 12, no. 4 (2023): 12. https://doi.org/10.5281/zenodo.8327988.
Full textParikshit N. Mahalle,Gitanjali Rahul Shinde,Nilesh P. Sable, Sayali Renuse,. "A Hybrid Perspective on Threat Analysis and Activity-Based Attack Modeling for Strengthening Access Control in IoT." Journal of Electrical Systems 20, no. 1s (2024): 366–78. http://dx.doi.org/10.52783/jes.777.
Full textAltheyabi, Jassir Adel. "Cyber Attacks Visualization and Prediction in Complex Multi-Stage Network." Academic Journal of Research and Scientific Publishing 3, no. 33 (2022): 59–85. http://dx.doi.org/10.52132/ajrsp.e.2022.33.3.
Full textDr., B. Premamayudu, Muralikrishna K., and Pramodh K. "Diabetes Prediction Using Machine Learning KNN -Algorithm Technique." International Journal of Innovative Science and Research Technology 7, no. 5 (2022): 941–44. https://doi.org/10.5281/zenodo.6642320.
Full textBeri, Shivani. "Automated Detection of Heart Attacks: A CNN-Based Approach." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1567–70. http://dx.doi.org/10.22214/ijraset.2023.57684.
Full textYi, Zhuo, Shi Jun Yao, and Liang Wang. "Researches on Brittle Seam Mining Based Situation Assessment and Prediction Mechanism of DDoS Attacks in Cloud Computing Platform." Applied Mechanics and Materials 519-520 (February 2014): 262–70. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.262.
Full textArivunambi, Amirthasaravanan, and Arjun Paramarthalingam. "A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment." Journal of Trends in Computer Science and Smart Technology 4, no. 2 (2022): 72–82. http://dx.doi.org/10.36548/jtcsst.2022.2.003.
Full textLipsa, Swati, Ranjan Kumar Dash, and Korhan Cengiz. "Mitigating Security Threats for Digital Twin Platform: A Systematic Review with Future Scope and Research Challenges." International Journal of Electronics and Communications Systems 4, no. 1 (2024): 1. http://dx.doi.org/10.24042/ijecs.v4i1.22279.
Full textNasrabadi, Abbas, and Javad Haddadnia. "Predicting Heart Attacks in Patients Using Artificial Intelligence Methods." Modern Applied Science 10, no. 3 (2016): 66. http://dx.doi.org/10.5539/mas.v10n3p66.
Full textTsai, Min-Jen, Ping-Yi Lin, and Ming-En Lee. "Adversarial Attacks on Medical Image Classification." Cancers 15, no. 17 (2023): 4228. http://dx.doi.org/10.3390/cancers15174228.
Full textKrieg, Steven J., Christian W. Smith, Rusha Chatterjee, and Nitesh V. Chawla. "Predicting terrorist attacks in the United States using localized news data." PLOS ONE 17, no. 6 (2022): e0270681. http://dx.doi.org/10.1371/journal.pone.0270681.
Full textPriyadi, Iman, Julius Santony, and Jufriadif Na'am. "Data Mining Predictive Modeling for Prediction of Gold Prices Based on Dollar Exchange Rates, Bi Rates and World Crude Oil Prices." Indonesian Journal of Artificial Intelligence and Data Mining 2, no. 2 (2019): 93. http://dx.doi.org/10.24014/ijaidm.v2i2.6864.
Full textPrajwal, S., M. Siddhartha, S. Charan, and L. Girish. "DDoS Detection and Mitigation SDN using Support Vector Machine." International Journal of Advanced Scientific Innovation 1, no. 2 (2021): 26–31. https://doi.org/10.5281/zenodo.4782280.
Full textP, Arul, and Shanmugapriya N. "Intrusion Detection Using IDMAL Algorithm for IOT Devices." Indian Journal of Science and Technology 16, no. 17 (2023): 1268–75. https://doi.org/10.17485/IJST/v16i17.2030.
Full textYogesh V. Gandge. "A Python Framework for Pest Management and Crop Yield prediction." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 48–53. https://doi.org/10.52783/cana.v32.3540.
Full textZhai, Kun, Qiang Ren, Junli Wang, and Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data." Mathematical Biosciences and Engineering 19, no. 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.
Full textYuan, Jiaqing, and Munindar P. Singh. "Conversation Modeling to Predict Derailment." Proceedings of the International AAAI Conference on Web and Social Media 17 (June 2, 2023): 926–35. http://dx.doi.org/10.1609/icwsm.v17i1.22200.
Full textHao, Qiang, Dongdong Xu, Yusen Qin, et al. "A Hardware Security Protection Method for Conditional Branches of Embedded Systems." Micromachines 15, no. 6 (2024): 760. http://dx.doi.org/10.3390/mi15060760.
Full textAlabdulatif, Abdulatif, and Sajjad Hussain Rizvi. "Network intrusion detection system using an optimized machine learning algorithm." Mehran University Research Journal of Engineering and Technology 42, no. 1 (2023): 153. http://dx.doi.org/10.22581/muet1982.2301.14.
Full textZhou, Meng, Xin Li, and Lejian Liao. "On Preventing Location Attacks for Urban Vehicular Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5850670.
Full textHosseinpoor, Mohammadjavad. "Presenting an Intelligent Algorithm to Predict Heart Attack." Journal of Health and Biomedical Informatics 10, no. 4 (2024): 346–56. http://dx.doi.org/10.34172/jhbmi.2024.03.
Full textAsra Sarwath, Dr. Raafiya Gulmeher, and Zeenath Sultana. "Neural Network Model Using An Enhanced Whale Optimization Method For Cyber Threat Detection." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 02 (2025): 164–71. https://doi.org/10.47392/irjaeh.2025.0022.
Full textShaikh, Rumana M. "Cardiovascular Diseases Prediction Using Machine Learning Algorithms." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1083–88. http://dx.doi.org/10.17762/turcomat.v12i6.2426.
Full textKhalaf, Meaad Ali, and Amani Steiti. "Artificial Intelligence Predictions in Cyber Security: Analysis and Early Detection of Cyber Attacks." Babylonian Journal of Machine Learning 2024 (May 9, 2024): 63–68. http://dx.doi.org/10.58496/bjml/2024/006.
Full textMa, Zhuo, Xinglong Wang, Ruijie Ma, Zhuzhu Wang, and Jianfeng Ma. "Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept." Sensors 18, no. 9 (2018): 2894. http://dx.doi.org/10.3390/s18092894.
Full textKlisarić, Sanja. "Cyber terrorism as a trigger for the growing need for security of the system from the dangers that come from the internet." Megatrend revija 18, no. 2 (2021): 247–56. http://dx.doi.org/10.5937/megrev2102247k.
Full textM. Gopila. "Predicting Unusual Activity Using CNN and Time Series for Enhanced Cyber Protection." Communications on Applied Nonlinear Analysis 32, no. 5s (2024): 78–90. https://doi.org/10.52783/cana.v32.2969.
Full textRamadhan, Rafiq Fajar, and Wahid Miftahul Ashari. "Performance Comparison of Random Forest and Decision Tree Algorithms for Anomaly Detection in Networks." Journal of Applied Informatics and Computing 8, no. 2 (2024): 367–75. https://doi.org/10.30871/jaic.v8i2.8492.
Full text