Follow

Submissions from 2021

PDF

Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, and Al-Sakib K. Pathan

Link

A genetic programming framework for novel behaviour discovery in air combat scenarios, Martin Masek, Chiou Peng Lam, Luke Kelly, Lyndon Benke, and Michael Papasimeon

Link

Can i trust you? incorporating supplier trustworthiness into supplier selection criteria, Daniel D. Prior, Morteza Saberi, Naeem Khalid Janjua, and Ferry Jie

PDF

A secured message transmission protocol for vehicular ad hoc networks, A. F. M. Suaib Akhter, A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin

Submissions from 2020

Link

Deep learning: Hope or hype, Mohiuddin Ahmed and A. K. M. Najmul Islam

Link

Blockchain: Can it be trusted?, Mohiuddin Ahmed and Al-Sakib Khan Pathan

PDF

False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure, Mohiuddin Ahmed and Al-Sakib Khan Pathan

Link

Advances in artificial intelligence (AI) for more effective decision making in agriculture, Leisa Armstrong, N. Gandhi, P. Taechatanasat, and Dean Diepeveen

PDF

The clash of empires: Regulating technological threats to civil society, Tracey Leigh Dowdeswell and Nachshon Goltz

PDF

From the tree of knowledge and the golem of Prague to kosher autonomous cars: The ethics of artificial intelligence through jewish eyes, Nachshon Goltz, John Zeleznikow, and Tracey Dowdeswell

Link

A progressive weighted average weight optimisation ensemble technique for fruit and vegetable classification, Khurram Hameed, Douglas Chai, and Alexander Rassau

PDF

Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, and Arafat Al-Dhaqm

PDF

Performances of the LBP based algorithm over CNN models for detecting crops and weeds with similar morphologies, Vi Nguyen Thanh Le, Selam Ahderom, and Kamal Alameh

PDF

SAM-SoS: A stochastic software architecture modeling and verification approach for complex System-of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, and Muhammad Ali Babar

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

PDF

Quantifiable isovist and graph-based measures for automatic evaluation of different area types in virtual terrain generation, Andrew Pech, Chiou Peng Lam, and Martin Masek

Link

Making the Information Technology (IT) business alignment works: a framework of IT-based competitive strategy, Ira Puspitasari and Ferry Jie

PDF

A novel penalty-based wrapper objective function for feature selection in big data using cooperative co-evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

PDF

Cooperative co-evolution for feature selection in big data with random feature grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

Link

Data science in cybersecurity and cyberthreat intelligence, Leslie F. Sikos and Kim-Kwang Raymond Choo

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp