Author:
Mounika Vanamala,Yuan Xiaohong,Bandaru Kanishka
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hybridization of metaheuristics and NLP approach to examine public opinion towards virtual voice assistants;Annals of Operations Research;2024-06-25
2. A Survey of Cybersecurity Knowledge Base and Its Automatic Labeling;Communications in Computer and Information Science;2024
3. CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge Graph;2023 8th International Conference on Data Science in Cyberspace (DSC);2023-08-18
4. Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
5. Leveraging Deep Learning Approaches for Deepfake Detection: A Review;Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence;2023-04-23