News

Autonomous vehicles, smart medical devices, retail security systems and other edge devices require real-time reaction speed, ...
The cybersecurity landscape has reached a tipping point. Organizations are battling a constant barrage of advanced threats—ransomware, phishing, insider attacks, and zero-day exploits—that can cripple ...
Several significant research studies related to Preventing Phishing Attacks for Cyber Threat Mitigation have been reviewed ...
This work focuses on outliers detection in long-term climate data by using machine learning models. The study uses meteorological data collected over 40 years (1981-2021) from ten synoptic stations ...
The security of Vehicle-to-Everything (V2X) networks is fundamental to the realization of next-generation intelligent transportation systems. However, the dynamic nature of V2X environments introduces ...
Keywords: federated learning, transformers, intrusion detection system (IDS), cybersecurity, Internet of Things (IoT), optimization Citation: Abd Elaziz M, Fares IA, Dahou A and Shrahili M (2025) ...
Intrusion detection has been of prime concern in the Internet of Things (IoT) environment due to the rapid increase in cyber threats. Majority of traditional intrusion detection systems (IDSs) rely on ...
Typical Azure Machine Learning Project Lifecycle (source: Microsoft). At the upcoming Visual Studio Live! @ Microsoft HQ 2025 conference in Redmond, Eric D. Boyd, founder and CEO of responsiveX, will ...