{"title":"A Machine Learning Based Secure Change Management","authors":"Mounia Zaydi, B. Nassereddine","doi":"10.1007/978-3-030-57024-8_23","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_23","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian Networks for Online Cybersecurity Threat Detection","authors":"Mauro José Pappaterra, Francesco Flammini","doi":"10.1007/978-3-030-57024-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_6","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab
{"title":"IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network","authors":"Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab","doi":"10.1007/978-3-030-57024-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_9","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed
{"title":"A Novel Deep Learning Model to Secure Internet of Things in Healthcare","authors":"Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed","doi":"10.1007/978-3-030-57024-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam
{"title":"Mobile Application Security Using Static and Dynamic Analysis","authors":"H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam","doi":"10.1007/978-3-030-57024-8_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_20","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ameliorated Face and Iris Recognition Using Deep Convolutional Networks","authors":"B. Muthazhagan, Suriya Sundaramoorthy","doi":"10.1007/978-3-030-57024-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_12","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115136358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís
{"title":"ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids","authors":"Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís","doi":"10.1007/978-3-030-71115-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_7","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena
{"title":"Comparative Analysis of Decision Tree Algorithms for Data Warehouse Fragmentation","authors":"Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena","doi":"10.1007/978-3-030-71115-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVID-19 pandemic risk analytics: Data mining with reliability engineering methods for analyzing spreading behavior and comparison with infectious diseases","authors":"A. Puls, S. Bracke","doi":"10.1101/2020.11.08.20227322","DOIUrl":"https://doi.org/10.1101/2020.11.08.20227322","url":null,"abstract":"In December 2019, the world was confronted with the outbreak of the respiratory disease COVID-19 (Corona). The first infection (confirmed case) was detected in the City Wuhan, Hubei, China. First, it was an epidemic in China, but in the first quarter of 2020, it evolved into a pandemic, which continues to this day. The COVID-19 pandemic with its incredible speed of spread shows the vulnerability of a globalized and networked world. The first months of the pandemic were characterized by heavy burden on health systems. Worldwide, the population of countries was affected with severe restrictions, like educational system shutdown, public traffic system breakdown or a comprehensive lockdown. The severity of the burden was dependent on many factors, e.g. government, culture or health system. However, the burden happened regarding each country with slight time lags, cf. Bracke et al. (2020). This paper focuses on data analytics regarding infection data of the COVID-19 pandemic. It is a continuation of the research study COVID-19 pandemic data analytics: Data heterogeneity, spreading behavior, and lockdown impact, published by Bracke et al. (2020). The goal of this assessment is the evaluation/analysis of infection data mining considering model uncertainty, pandemic spreading behavior with lockdown impact and early second wave in Germany, Italy, Japan, New Zealand and France. Furthermore, a comparison with other infectious diseases (measles and influenza) is made. The used data base from Johns Hopkins University (JHU) runs from 01/22/2020 until 09/22/2020 with daily data, the dynamic development after 09/22/2020 is not considered. The measles/influenza analytics are based on Robert Koch Institute (RKI) data base 09/22/2020. Statistical models and methods from reliability engineering like Weibull distribution model or trend test are used to analyze the occurrence of infection.","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}