Data protection is the process of securing sensitive information from be...
The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
Social engineering through social media channels targeting organizationa...
As many industries shift towards centralised controlled information syst...
Financial fraud detection is an important problem with a number of desig...
The search ability of an Evolutionary Algorithm (EA) depends on the vari...
Evolutionary algorithms (EA) have been widely accepted as efficient solv...
Many machine learning (ML) approaches are widely used to generate biocli...
Surrogate assisted evolutionary algorithms (EA) are rapidly gaining
popu...
Stochastic, iterative search methods such as Evolutionary Algorithms (EA...