Author:
Tiwari Ashish,Sharma R. M.,Garg Ritu
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A holistic mathematical cyber security model in fog resource management in computing environments;Journal of Discrete Mathematical Sciences and Cryptography;2024
2. Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23
3. An investigation of Malware Detection System using Deep Learning on computing Systems;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23
4. A Novel credit card fraud detection feature selection system using machine learning;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23
5. A machine learningbased framework to Classify Xrays anomality;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23