has been cited by the following article(s):
|
[1]
|
A hierarchical deep learning framework with doubly regularized loss for robust malware detection and family categorization
Scientific Reports,
2026
DOI:10.1038/s41598-025-31444-w
|
|
|
|
|
[2]
|
Linguistic analysis of cyber threats: A philological approach to AI-driven threat detection
PROCEEDINGS OF THE 2025 12TH INTERNATIONAL CONFERENCE ON MECHANICS, MATERIALS AND MANUFACTURING: ICMMM2025,
2026
DOI:10.1063/5.0298440
|
|
|
|
|
[3]
|
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems
Scientific Reports,
2026
DOI:10.1038/s41598-026-36966-5
|
|
|
|
|
[4]
|
Multimodal Network Intrusion Detection Model based on Deep Learning
2025 IEEE International Conference on Blockchain Technology and Information Security (ICBCTIS),
2025
DOI:10.1109/ICBCTIS66509.2025.11387606
|
|
|
|
|
[5]
|
Benchmarking and Evaluating Large Language Models in Phishing Detection for Small and Midsize Enterprises: A Comprehensive Analysis
IEEE Access,
2025
DOI:10.1109/ACCESS.2025.3540075
|
|
|
|
|
[6]
|
LLM-Based Topic Modeling for Dark Web Q&A Forums: A Comparative Analysis With Traditional Methods
IEEE Access,
2025
DOI:10.1109/ACCESS.2025.3560543
|
|
|
|
|
[7]
|
Future of cyberspace: A critical review of standard security protocols in the post-quantum era
Computer Science Review,
2025
DOI:10.1016/j.cosrev.2025.100738
|
|
|
|
|
[8]
|
Generative AI Security
2025
DOI:10.1002/9781394368532.ch1
|
|
|
|
|
[9]
|
EU Digital Law in the AI Era
2025
DOI:10.1007/978-3-031-96743-6_14
|
|
|
|
|
[10]
|
Detecting Fake URLs and Preventing Malware Using Machine Learning
2024 International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC),
2024
DOI:10.1109/ICEC59683.2024.10837506
|
|
|
|
|
[11]
|
Organizational Readiness and Research
Advances in Human Resources Management and Organizational Development,
2024
DOI:10.4018/979-8-3693-8562-3.ch008
|
|
|
|