1 - 4 of 4 articles
Abstract A critical shortage of cybersecurity talent exists in the United States. The lack of personnel has resulted in increased competition for the cybersecurity professionals. As the field of cybersecurity has evolved, a significant salary gap has surfaced between public and private...
Abstract There are various new-age crime rackets reported with the help of digital technology and such cases are routinely investigated by the police and digital forensics analysts. In the course of investigation of different rackets such as Aadhaar card, ATM card, PAN card, ration card, voter...
Abstract Many strategies use ML algorithms for intelligent IDS as part of the development of IoT security. These algorithms are quite susceptible to being manipulated to provide biased results. A variety of contradictory threats are constantly present throughout the use of ML, such as the...
Abstract Intelligent systems, machine learning models, and artificial intelligence methods are increasing in complexity, and the integration of such technologies has also increased. However, the rise in the adoption of intelligent systems has raised many challenges, including increased attack...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.