Cited By
View all- Abdallah HAbd-Elkader HMohamed KAbd-Elmoniem MEl-Assal NMohamed SSaid SSalem S(2024)Performance Evaluation Framework for Insider Threat Detection Using Machine Learning2024 Intelligent Methods, Systems, and Applications (IMSA)10.1109/IMSA61967.2024.10652829(1-6)Online publication date: 13-Jul-2024
- Gulhane KSaxena SDeogaonkar AKumar VVichoray CGoyal S(2024)Overview of Machine Learning Techniques in Cybersecurity Data Science using Gradient Boosting and Random Forest Algorithm2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)10.1109/ICoICI62503.2024.10696688(19-24)Online publication date: 28-Aug-2024
- Chaudhary DSharma KSharma VJain P(2024)GRU-Enhanced Decoding by Lightweight Transformer for Image Captioning2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/Confluence60223.2024.10463460(407-410)Online publication date: 18-Jan-2024
- Show More Cited By