https://dewisurga.net/
https://dewasurga.it.com/
https://www.bng-tech.com/
https://viewlike.us
https://stasiunbandung.com/
https://hotel.kirpisoft.com.tr/
https://www.amerikankonsoloslugu.org/
https://www.singaporesunfestival.com/
https://epu-upr.org/
https://rehsystems.com/
https://wartabogor.com/
https://www.billottiscatering.com/
https://www.cherryvalleytractor.net/
https://www.acholinet.com/
https://m.exim-pharm.com/
https://www.garnish.tv/m/
https://tri-aster.com/about-us.php
https://www.arcadia-medical.com/
https://gatorcues.com/contact-us/
https://www.ozteknikbeyazesya.com/iletisim/
https://alumni.kongu.edu/about-us/
https://www.avaniagrotourism.com/about.php
https://angad.vic.edu.au/contact/
https://observatorioti.cuti.org.uy/en/
https://himalayanzems.com/contact/
https://veterinary.hudhudclient.com/
https://blogs.gomygo.com/about/
https://yekimesleto.com/contact/
https://www.revampservice.com/faq.php
https://provial.cl/2023/hoteles/
https://hulksolution.com/contactus
https://dualinfotechgroup.com/contact/

Projects

IEEE CYBER SECURITY DOMAIN PROJECTS

  • Empirical Studies of TESLA Protocol Properties Implementations and Replacement of Public Cryptography Using Biometric Authentication
  • CyberPhysical Attack Conduction and Detection in Decentralized Power Systems
  • DivergenceBased Transferability Analysis for SelfAdaptive Smart Grid Intrusion Detection With Transfer Learning
  • False Data Detection in a Clustered Smart Grid Using Unscented Kalman Filter
  • Parkinsons Disease Management via Wearable Sensors A Systematic Review
  • Sentiment Analysis of Weibo Comments Based on Graph Neural Network
  • Robust Network Intrusion Detection Through Explainable Artificial Intelligence XAI
  • Adversarial Machine Learning in Text Processing A Literature Survey
  • Combining LongTerm Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML
  • RTIDS A Robust TransformerBased Approach for Intrusion Detection System
  • SimCSE for Encrypted Traffic Detection and ZeroDay Attack Detection
  • A Generalized Hold Based Countermeasure Against ZeroDynamics Attack With Application to DCDC Converter
  • TTIDS TransmissionResuming TimeBased Intrusion Detection System for Controller Area Network CAN
  • A Comprehensive Analysis of Todays Malware and Its Distribution Network Common Adversary Strategies and Implications
  • A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
  • Machine Learning and Deep Learning Approaches for CyberSecurity A Review
  • Robust Natural Language Processing Recent Advances Challenges and Future Directions
  • Containment Control of Multiagent Systems Subject to Denial of Service Attacks
  • Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
  • A New Injection Threat on S71500 PLCs Disrupting the Physical Process Offline
  • DVAEGMM Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks
  • A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for InVehicle Networks
  • A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During CyberAttacks