To search, Click below search items.
All Published Papers Search Service
Title
Adversarial Attack on Network Traffic using Machine Learning for Software Defined Networks
Author
Muhammad Shahzad Haroon and Dr Husnain Mansoor
Vol. 26 No. 3 pp. 37-46
Keywords
SDN, Security, Machine learning, Openflow, dataset, Adversarial attack
A Deception-Driven AI Framework for Detecting Cyberattacks in Mobile Financial Applications Using GANs, Reinforcement Learning, and SVM
Chidiebere, Abigail Nnenna, Abiodun Esther Omolara, Mohammed Hammawa
Vol. 26 No. 3 pp. 23-36
Deception technology; honeypots; honey transactions; mobile banking security; generative adversarial networks; reinforcement learning; support vector machines; anomaly detection
The Joint Moderating Role and Factors of Trust in Consumer-to-Consumer Electronic Commerce with Gender and Age
Amin Mostofi, Parisa Taromi, Ramin Karimi
Vol. 26 No. 3 pp. 15-22
Trust, C2C e-commerce, trust certificate, security, age, gender
Real-Time Energy Management of a Microgrid using MPC-DDQN Controlled V2H and H2V with Renewable Energy Integration
Ahmed Albugmi
Vol. 26 No. 3 pp. 1-14
Intelligent Home Energy Management; Hydrogen-Powered Energy Systems; Vehicle-to-Home and Home-to-Vehicle; Double Deep Q-Learning; Autonomous Hybrid Energy Framework; Multi-Agent System Coordination