As IoT devices are becoming widely deployed, there exist many threats to...
Network intrusion detection systems (NIDS) are an essential defense for
...
Current app ranking and recommendation systems are mainly based on
user-...
Today, two-factor authentication (2FA) is a widely implemented mechanism...
One of the most challenging problems in the field of intrusion detection...
Autoencoder-based anomaly detection methods have been used in identifyin...
Malicious clients can attack federated learning systems by using malicio...
The home voice assistants such as Amazon Alexa have become increasingly
...
Ransomware is a kind of malware using cryptographic mechanisms to preven...
Witnessing the increasingly pervasive deployment of security video
surve...
The drone technology has been increasingly used by many tech-savvy consu...
Video Surveillance Systems (VSS) have become an essential infrastructura...
Deep learning models have consistently outperformed traditional machine
...