Ads block

Banner 728x90px

IoT Security Fortification: Enhancing Cyber Threat Detection Through Feature Selection and Advanced Machine Learning


IoT Security Fortification: Enhancing Cyber Threat Detection Through Feature Selection and Advanced Machine Learning
Title: IoT Security Fortification: Enhancing Cyber Threat Detection Through Feature Selection and Advanced Machine Learning Conference: 2024 1st International…
Read more »

Interpretable Machine Learning for IoT Security: Feature Selection and Explainability in Botnet Intrusion Detection using Extra Trees Classifier


Interpretable Machine Learning for IoT Security: Feature Selection and Explainability in Botnet Intrusion Detection using Extra Trees Classifier
Title:  Interpretable Machine Learning for IoT Security: Feature Selection and Explainability in Botnet Intrusion Detection using Extra Trees Classifier Confer…
Read more »

Engineering education beckons better future


Engineering education beckons better future
Newspaper Article:  Engineering education beckons better future Link: https://www.observerbd.com/news/502013 #engineeringEducation #alamgirHossain
Read more »

From Labs to Leadership – Engineering a Better Future


From Labs to Leadership – Engineering a Better Future
Article published in  Business Mirror Title " From Labs to Leadership – Engineering a Better Future" Link:  https://bmirror.net/from-labs-to-leadersh…
Read more »

Deep learning and ensemble methods for anomaly detection in ICS security


Deep learning and ensemble methods for anomaly detection in ICS security
📚✨ Latest research paper, titled "Deep learning and ensemble methods for anomaly detection in ICS security," has just been published in the esteeme…
Read more »

Example of hierarchical data representing a library system with sections, book categories, and books in JSON and XML formats


Provide an example of hierarchical data representing a library system with sections, book categories, and books in JSON and XML formats. Requirements: In y…
Read more »

Enhancing EDoS attack detection in cloud computing through a data-driven approach


Enhancing EDoS attack detection in cloud computing through a data-driven approach
Title: I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach Journal: Journal of Cloud Computing Quartile: Q1 Impact Fac…
Read more »

Publication on security titled "Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective"


Publication on security titled "Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective"
Publication title: " Towards Superior Android Ransomware Detection: An Ensemble Machine Learning Perspective".  Journal:  Cyber Security and Applicat…
Read more »

Find the Top Cited Researcher of your University through Google Scholar


Find the Top Cited Researcher of your University through Google Scholar
Find the Top Cited Researcher of your University through Google Scholar.  # UniversityResearchers hashtag # GoogleScholar hashtag # TopResearchers
Read more »

Internet of things enabled E-learning system for academic achievement among university students


Internet of things enabled E-learning system for academic achievement among university students
Newly Published Paper: "Internet of things enabled E-learning system for academic achievement among university students".  Journal: E-Learning and …
Read more »

Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis


Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis
Publication of "Implication of Different Data Split Ratios on the Performance of Models in Price Prediction of Used Vehicles Using Regression Analysis&quo…
Read more »

Digital Guardians: Securing Social Media, Md. Alamgir Hossain


Digital Guardians: Securing Social Media, Md. Alamgir Hossain
Digital Guardians: Securing Social Media Social media has woven itself into the fabric of our daily lives, connecting us with friends and family, keeping us …
Read more »

Way to Find an Engineering Research Topic


Way to Find an Engineering Research Topic
Way to Find an Engineering Research Topic Finding a compelling research topic in engineering requires a blend of curiosity, strategic thinking, and awareness…
Read more »

6G Wireless Communication Networks: Challenges and Potential Solution


6G Wireless Communication Networks: Challenges and Potential Solution
6G Wireless Communication Networks: Challenges and Potential Solutions  Article Title: 6G Wireless Communication Networks: Challenges and Potential Solutions J…
Read more »

Common security attacks in networks


Common security attacks in networks
Here are some common security attacks in networks: 1. Denial of Service (DoS) Attack: What it is: A DoS attack aims to make a network resource or service un…
Read more »