Stop the war!
Остановите войну!
for scientists:
default search action
ISDFS 2023: Chattanooga, TN, USA
- 11th International Symposium on Digital Forensics and Security, ISDFS 2023, Chattanooga, TN, USA, May 11-12, 2023. IEEE 2023, ISBN 979-8-3503-3698-6
- Matthias Seul, Cihan Varol:
Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices. 1-7 - Gamzepelin Aksoy, Murat Karabatak:
Comparison of QSVM with Other Machine Learning Algorithms on EEG Signals. 1-5 - Phani Lanka, Cihan Varol, Narasimha K. Shashidhar:
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals. 1-6 - Arman Hamzehlou Kahrizi, Christopher Chun Ki Chan, Alexander Ferworn:
Universal Simulation Platform Online, A Multi-Participants I.E.D. Disposal Simulator. 1-5 - Sheikh Shamshad Ahmed, Afrin Akter Mim, Dipto Saha, Kamrun Nahar, Md. Aynul Hasan Nahid:
A CNN-Based Novel Approach for The Detection of Compound Bangla Handwritten Characters. 1-6 - Ekin Can Erkus, Müslüm Ersel Er, Alper Yildiz, Mustafa Gencer:
An Investigation of the Effects of the Numerical Missing Value Imputation Methods for Click-through Rate Estimation Performances. 1-5 - Twana Mustafa, Murat Karabatak:
Challenges in Automatic License Plate Recognition System Review. 1-6 - Gokce Yildirim, Erkan Tanyildizi:
Random Number Generator Based on Optimization and Chaotic System. 1-4 - Diana Gutierrez, William Ocampo, Alexander Perez-Pons, Himanshu Upadhyay, Santosh Joshi:
Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source Framework. 1-6 - Nuno Fernandes, Joaquim Gonçalves:
Multivariate and multi-output indoor air quality prediction using bidirectional LSTM. 1-6 - Siqi Xie, Xiuxia Tian:
Fused Syntactic and Semantic Parsing for Measuring Privacy Level in Unstructured Text. 1-6 - Murat Bakirci, Muhammed Mirac Ozer:
Surveillance, Reconnaissance and Detection Services for Disaster Operations of IoT-Based eVTOL UAVs with Swarm Intelligence. 1-6 - Khalid Hasan Tantawi, Ahad Nasab, Lyn Potter, Omar Tantawi, Nancy Wilson, Alisa Henrie, Arif Sirinterlikci, Erkan Kaplanoglu:
Mechatronics Education- Current and Future Trends. 1-5 - Abdulrahman A. El Tawil, Khouloud Samrouth:
IEWS: a Free Open Source Intelligent Early Warning System Based on Machine Learning. 1-3 - Yuan Wei, Xiuxia Tian:
Deep Learning-Based Attribute Optimization Method for ABAC. 1-5 - Sami Haj Ali, Hüseyin Aygün:
Shape Detection Using Air-Drawing. 1-5 - Erman Ozpolat, Arif Gülten:
A Novel 4D Hyperchaotic System with Its Dynamical Analysis and Synchronization. 1-5 - Deraw Kamaran Salih, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb:
A Hybrid Approach to Osteosarcoma Detection Using Densenet201-SVM Model. 1-5 - Leah McIntyre, Eva Tuba:
Brain Tumor Segmentation and Classification using Texture Features and Support Vector Machine. 1-5 - Gahangir Hossain, Josh Tarrant:
CyberTMS : A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0. 1-6 - Una Tuba, Eva Tuba, Milan Tuba, Mladen D. Veinovic:
Feature Selection for Classification Problems by Binary Bare Bones Fireworks Algorithm. 1-6 - Jun Wu, Xuesong Ye, Chengjie Mou, Weinan Dai:
FineEHR: Refine Clinical Note Representations to Improve Mortality Prediction. 1-6 - Ingororano Théophile, Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility. 1-6 - Swapna Mele Pottaraikkal, Akash Sujeer Sugatha:
Effectiveness of Multiple Memory-Images in detecting Fileless Malware. 1-5 - Prasanna Srinivasan S, Shiju Sathyadevan:
GPS Spoofing Detection in UAV Using Motion Processing Unit. 1-4 - Aulia Teaku Nururrahmah, Tohari Ahmad:
CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection System. 1-6 - Shahriar Saadat:
Wiegand vs. OSDP in Cyber Security. 1-3 - Achmad Mufliq, Amalia Utamima:
Genetic Algorithm and Local Search for Optimization of Tourism Trips as an Orienteering Problem. 1-5 - Andrew Fredrick Nyoka, Kelvin Sauli Godfrey, Happines Gideon Mwakilembe, Leonard Jonas Mugendi, Oscar David Mbita, Adramane Assoumana, Dawson Ladislaus Msongaleli:
Reliable Face Identification System for Criminal Investigation. 1-5 - Okan Yaman, Tolga Ayav, Yusuf Murat Erten:
A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming. 1-5 - Menchie Rosales, Jade Berasis, Sajuid Kyle Dancel, Angelo Sahagun, Jeremiah Tacardon, Alonica R. Villanueva:
Data Converter Device in Detecting Water Toxicity for Poultry Industry. 1-6 - Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan:
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline. 1-6 - Anna Denisova:
Evaluation of DeepMedic Neural Network for a Region of Interest Eextraction in Medical Image Watermarking. 1-6 - Bonry Dorado, Alonica R. Villanueva:
Development of Low-Latency and Real-Time Filipino Children Automatic Speech Recognition System using Deep Neural Network. 1-6 - Twana Mustafa, Murat Karabatak:
Deep Learning Model for Automatic Number/License Plate Detection and Recognition System in Campus Gates. 1-5 - Murat Bakirci, Muhammed Mirac Ozer:
5G Network Supported Unmanned Aerial Vehicle Avionics for Military Zone Surveillance and Security. 1-6 - Günes Gürsoy, Asaf Varol, Ahad Nasab:
Importance of Machine Learning and Deep Learning Algorithms in Earthquake Prediction: A Review. 1-6 - Akhil Raj, Sriram Sankaran:
Battery Drain using WiFi Beacons. 1-6 - Md. Rayhan Ahmmed, Md. Mamun Sakib, Maruf Ur Rahman, Rabeya Bibi, Md. Maruf Hasan Talukder, Ms. Johora Akter Polin:
Encryption process of Blockchain based online course curriculum education system. 1-7 - Seydanur Ahi Duman, Rukiye Hayran, Ibrahim Sogukpinar:
Impact Analysis and Performance Model of Social Engineering Techniques. 1-6 - Naveed Ahmed, Asaf Varol, Ahad Nasab:
Localization by OSS and BSS Collected Data. 1-7 - Hacer Varol, Timothy W. Kaufman:
Differentiating Systematic Cyber Attacks from Random Attacks in Space Communication. 1-5 - Murat Bakirci, Muhammed Mirac Ozer:
A Low-Cost UAV Design for Surveillance Purposes in Swarm Systems. 1-6 - Burcu Alper, Selma Nazlioglu, Hürevren Kiliç:
ACE-PE: An Automated Code Evaluation Software Tool For Programming Education. 1-5 - Md. Kamrul Hasan Sabbir, Serkan Varol:
Analysis of Variance of Accident Data to Detect Factors Correlating to Fatalities in Tennessee. 1-5 - Sal Aguinaga, Daniel Lasaga, Shivashankar Danthuri, John Helms, Edward Bowen, Sanmitra Bhattacharya:
Identification of Providers with Similar Risk Profiles in Healthcare Claims Using Graphs. 1-6 - Ankur Chattopadhayay, Zackary Luedtke:
Towards A Unique Online Healthcare Information (OHI) Recommender: A Preliminary Case Study. 1-8 - David Shapiro, Vladislav Sergeyev, Victor Fedoseev:
Improved ECC-based Phase Watermarking Method for Video Copyright Protection. 1-6 - Ana Rita Antunes, Joaquim P. Silva, Ana Cristina Braga, Joaquim Gonçalves:
Feature Selection Optimization for Heart Rate Variability. 1-6 - Amaldeep S, Sriram Sankaran:
Cross Protocol Attack on IPSec-based VPN. 1-6 - Navdeep Singh, Kurunandan Jain:
Data Security Approach Using Blockchain Mechanism and Cryptography Algorithms. 1-6 - Can Özbey, Eyüp Kaan Ülgen:
Distribution of High-Frequency Words: An Analytical Investigation. 1-6 - Julia Loncala, Madeline Irvin, Alyson Globis, Katie Harvat, Mason Seitz, Garrett Goodman:
Towards Complex Regional Pain Syndrome (CRPS) Monitoring and Management Using an AI Powered Mobile Application. 1-6 - Müslim Alanoglu, Songül Karabatak, Murat Karabatak:
The Effect of Distance Instruction Based on the ARCS Motivation Model on the Course Interest. 1-4 - Kiran Peddireddy:
Streamlining Enterprise Data Processing, Reporting and Realtime Alerting using Apache Kafka. 1-4 - Suman Rath, Tapadhir Das, Ignacio Astaburuaga, Shamik Sengupta:
Less is More: Deep Learning Framework for Digital Forensics in Resource-Constrained Environments. 1-6 - Ibrahim Yilmaz, Mahmoud Abouyoussef:
FIGO: Fingerprint Identification Approach Using GAN and One Shot Learning Techniques. 1-6 - Victor Fedoseev:
Quantization-Based Watermarking Methods with Reduced Distortion. 1-6 - Menchie Rosales, Regiena Marie Culpable, Christian Cayanan, Gino Forcadela, Gilian Mae Boctil, Maria Cecilia Venal:
Local-Export Quality Classification Device for Multiple Unripe Carabao Mango using Single Shot Detector Algorithm. 1-6 - Domingos Araújo, Joaquim Silva, Patricia Leite Brandao, Óscar Ribeiro, Paulo Teixeira:
Predict Malware Using Machine Learning. 1-6 - Dishant Banga, Prerana Singh:
Emotion Detection in Speech. 1-4 - Jason Ford, Hala Strohmier Berry:
Leveling Up Survey of How Nation States Leverage Cyber Operations to Even the Playing Field. 1-5 - Zeynep Ozpolat, Murat Karabatak:
Exploring the Potential of Quantum-Based Machine Learning: A Comparative Study of QSVM and Classical Machine Learning Algorithms. 1-5 - Biodoumoye George Bokolo, Lei Chen, Qingzhong Liu:
Detection of Web-Attack using DistilBERT, RNN, and LSTM. 1-6 - Md. Alif Sheakh, Mst. Sazia Tahosin, Md Maruf Hasan, Taminul Islam, Onamika Islam, Md Masum Rana:
Child and Maternal Mortality Risk Factor Analysis Using Machine Learning Approaches. 1-6 - Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi:
Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis. 1-6 - Hala Strohmier Berry:
The Importance of Cybersecurity in Supply Chain. 1-5 - Songül Karabatak, Sevinç Ay, Murat Karabatak:
The Relationship between Digital Citizenship and Information Security Achievement. 1-5 - Lava Th. Omar, Judy M. Hussein, Lava F. Omer, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb:
Lung And Colon Cancer Detection Using Weighted Average Ensemble Transfer Learning. 1-7 - Mahadi Hasan, Mst. Sazia Tahosin, Afia Farjana, Md. Alif Sheakh, Md Maruf Hasan:
A Harmful Disorder: Predictive and Comparative Analysis for fetal Anemia Disease by Using Different Machine Learning Approaches. 1-6 - Jun Wu, Xuesong Ye, Yanyuet Man:
BotTriNet: A Unified and Efficient Embedding for Social Bots Detection via Metric Learning. 1-6 - Aykut Karakaya, Ahmet Ulu:
A Review on Latest Developments in Post-Quantum Based Secure Blockchain Systems. 1-6 - Gunay Abdiyeva-Aliyeva:
AI-Based Network Security Anomaly Prediction and Detection in Future Network. 1-5 - Hala Strohmier Berry:
Survey of the Challenges and Solutions in Cybersecurity Awareness Among College Students. 1-6 - Wei-Che Lee, Hong-Yen Chen, Tsung-Nan Lin:
A Predictive Classification Model for Identifying Conversation-related Mobile Forensic Data in Instant Messaging Applications. 1-6 - Faiyaz Fahim:
A Deep Learning Method to Predict Loss of Coolant Accident in Nuclear Power Plants. 1-4 - Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors. 1-6 - Anil Sezgin, Aytug Boyaci:
A Survey of Privacy and Security Challenges in Industrial Settings. 1-7 - Hugo Lopes, Filipe Coelho, Joaquim Gonçalves:
W.A.R. - Wheelchair Activity Recognition. 1-6 - Nurettin Selcuk Senol, Amar Rasheed:
A Testbed for LoRa Wireless Communication between IoT devices. 1-6 - Sibel Gülmez, Arzu Gorgulu Kakisim, Ibrahim Sogukpinar:
Analysis of the Dynamic Features on Ransomware Detection Using Deep Learning-based Methods. 1-6 - Richard Ward, Andrew Johnson:
Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process. 1-5 - Rui Fernandes, João Silva, Óscar Ribeiro, Irene Portela, Nuno Lopes:
The impact of identifiable features in ML Classification algorithms with the HIKARI-2021 Dataset. 1-5 - Kelsie Edie, Cole Mckee, Adam Duby:
Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. 1-6 - Zein Al-Abidin Mohammad Fneish, Mohammad El-Hajj, Khouloud Samrouth:
Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review. 1-7 - Müslim Alanoglu, Songül Karabatak, Murat Karabatak:
The Relationship between Transactional Distance Perceptions and Academic Self-Efficacy. 1-4 - Anthony Niño S. Aquino, Alonica R. Villanueva:
Network Anomaly Detection Using NetFlow and Network Automation. 1-6 - Miguel V. P. R. Meneses, Ana Rita Antunes, Joaquim Gonçalves:
Driver Drowsiness Classification using Machine Learning and Heart Rate Variability. 1-6 - Sujitha Sudevan, Kurunandan Jain:
A Lightweight Medical Image Encryption Scheme Using Chaotic Maps and Image Scrambling. 1-6 - Twana Mustafa, Murat Karabatak:
Feature Selection for Phishing Website by Using Naive Bayes Classifier. 1-4 - Amalia Utamima, Farrel Istihsan Aditya, Firdaus W. G. Ashaari, Alfito K. Nugraha:
Applying Machine Learning Algorithms for Opinion Mining on a Digital Internet Service Provider. 1-5 - Paulo Meneses, Nuno Lopes, Patrícia Leite, Paulo Teixeira, Joaquim Gonçalves, Joaquim P. Silva:
A Pre-Diagnosis Model for Indoor Radon Potential Assessment. 1-6 - Mohak Kataria, Kurunandan Jain, Narayanan Subramanian:
Exploring Advanced Encryption and Steganography Techniques for Image Security. 1-6 - Aswathy Krishna R, Narayanan Subramanian, Kurunandan Jain:
Image Steganography Using HBV And Padded RSA. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.