default search action
15th SOLI 2021: Singapore
- Ian McLoughlin:
2021 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, December 11-12, 2021. IEEE 2021, ISBN 978-1-6654-6723-0 - Prajwal Kaushal:
Deep RNN-based Traffic Analysis Scheme for Detecting Target Applications. 1-5 - Tan Hui Yang Zen, Chin Bing Hong, Purnima Murali Mohan, Vivek Balachandran:
ABC-Verify: AI-Blockchain Integrated Framework for Tweet Misinformation Detection. 1-5 - Shah Md Istiaque, Md Toki Tahmid, Asif Iqbal Khan, Zaber Al Hassan, Sajjad Waheed:
Artificial Intelligence Based Cybersecurity: Two-Step Suitability Test. 1-6 - Adrian Chan Feng Jun, Andrew Fong En Wei, Chua Wee Chye Ryan, Goh Qing Han, Jacob Abraham, Zhengkui Wang:
LionKeeper: Automatically Discovering Timely Cybercrime Dynamics in the Age of COVID-19. 1-6 - Shah Md Istiaque, Md Toki Tahmid, Asif Iqbal Khan, Zaber Al Hassan, Sajjad Waheed:
State-of-the-Art Artificial Intelligence Based Cyber Defense Model. 1-6 - Kunlun Wei, Tao Zhang:
Research on security technology framework of UAV cluster system. 1-5 - Kiruthiga Subramanian, Weizhi Meng:
Threat Hunting Using Elastic Stack: An Evaluation. 1-6 - Huaqun Guo, Meng Wei, Ping Huang, Eyasu Getahun Chekole:
Enhance Enterprise Security through Implementing ISO/IEC 27001 Standard. 1-6 - Eyasu Getahun Chekole, Huaqun Guo:
DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem. 1-6 - Qinglin Wang, Jiqiang Lu:
Fault Analysis of the ARIA and uBlock Block Ciphers. 1-6 - Maha A Abdullah, Mazen A Abdullah:
How COVID-19 Has Affected the Internet of Things (IoT) Technology. 1-6 - Abdullah All Mamun Anik, Shuvodip Adhikary, Istiak Habib, Abdul Gafur:
IoT Based Mechanized Robot: An Integrated Process Involving Fulltime Multipurpose Control, Automation and Surveillance System. 1-6 - Saksham Bhushan, Maode Ma:
Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing. 1-6 - Ryan Fraser Kirwan, Javihn Che, Woo Jia Le, Stefan Sarin:
A Visualization and Analysis tool for VCL Auto-generation Code Framework. 1-5 - Yukari Shirota, Akane Murakami:
Long-term Time Series Data Clustering of Stock Prices for Portfolio Selection. 1-6 - Takumi Miura, Takumi Furukawa, Junko Harada, Yudai Hirano, Takako Hashimoto:
Evaluation of Universities' Integrated Reports Using Text Mining Technique. 1-6 - Rikta Sen, Ashis Kumar Mandal, Basabi Chakraborty:
Performance Analysis of Extended Lustgarten Index for Stability of Feature Selection. 1-5 - Arnab Kumar Ghoshal, Nabanita Das:
Anomaly Detection in Evolutionary Social Networks leveraging Community Structure. 1-6 - Inderpreet Kaur, Manpreet Singh Manna, Ramalatha Marimuthu:
Implementing Hybrid Amplifiers for DWDM System using Artificial Intelligence Methods. 1-5 - De Xing Ong, Kai Xiang Chia, Yi Yi Huang, Jasper Teck Siong Teo, Jezamine Tan, Melissa Lim, Dongyu Qiu, Xinxing Xia, Frank Yunqing Guan:
Smart Captions: A Novel Solution for Closed Captioning in Theatre Settings with AR Glasses. 1-5 - Feng Ting Hoe, Purnima Murali Mohan:
ASIST: Automated Strategic Partners Ranking and Recommendation System Using NLP and Security Intelligence. 1-6 - Md. Mohidul Hasan, Syed Mahbubuz Zaman, Md. Asif Talukdar, Ayesha Siddika, Md. Golam Rabiul Alam:
An Analysis of Machine Learning Algorithms and Deep Neural Networks for Email Spam Classification using Natural Language Processing. 1-6 - Jeannie S. Lee, Muhamed Fauzi Bin Abbas, Chee Kiat Seow, Qi Cao, Kar-Peo Yar, Sye Loong Keoh, Ian McLoughlin:
Non-Verbal Auditory Aspects of Human-Service Robot Interaction. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.