Pub Date : 2021-02-13DOI: 10.1007/978-3-030-62796-6_20
H. Zakaria
{"title":"The Use of Artificial Intelligence in E-Accounting Audit","authors":"H. Zakaria","doi":"10.1007/978-3-030-62796-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-62796-6_20","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114621409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-13DOI: 10.1007/978-3-030-62796-6_11
Sertaç Yerlikaya, Y. O. Erzurumlu
{"title":"Artificial Intelligence in Public Sector: A Framework to Address Opportunities and Challenges","authors":"Sertaç Yerlikaya, Y. O. Erzurumlu","doi":"10.1007/978-3-030-62796-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-62796-6_11","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_5
Giuseppina Andresini, A. Appice, Francesco Paolo Caforio, D. Malerba
{"title":"Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samples","authors":"Giuseppina Andresini, A. Appice, Francesco Paolo Caforio, D. Malerba","doi":"10.1007/978-3-030-57024-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_5","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125838635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_16
Anass Sebbar, Karim Zkik, Youssef Baddi, M. Boulmalf, Mohamed Dâfir Ech-Cherif El Kettani
{"title":"Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks","authors":"Anass Sebbar, Karim Zkik, Youssef Baddi, M. Boulmalf, Mohamed Dâfir Ech-Cherif El Kettani","doi":"10.1007/978-3-030-57024-8_16","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_16","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_21
Fadi Muheidat, L. Tawalbeh
{"title":"Mobile and Cloud Computing Security","authors":"Fadi Muheidat, L. Tawalbeh","doi":"10.1007/978-3-030-57024-8_21","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_21","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management","authors":"Youssef Baddi, Sebbar Anass, Karim Zkik, Yassine Maleh, Boulmalf Mohammed, Ech-Cherif El Kettani Mohamed Dafir","doi":"10.1007/978-3-030-57024-8_17","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_17","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134030968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_14
Ferda Özdemir Sönmez
{"title":"Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis","authors":"Ferda Özdemir Sönmez","doi":"10.1007/978-3-030-57024-8_14","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_14","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133214409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_8
Md. Omar Faruque Khan Russel, Sheikh Shah Mohammad Motiur Rahman, M. Alazab
{"title":"AndroShow: A Large Scale Investigation to Identify the Pattern of Obfuscated Android Malware","authors":"Md. Omar Faruque Khan Russel, Sheikh Shah Mohammad Motiur Rahman, M. Alazab","doi":"10.1007/978-3-030-57024-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_8","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130772314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1007/978-3-030-57024-8_11
S. Gupta, Parag P. Thakur, Kamal Biswas, Satyajeet Kumar, Aman Singh
{"title":"Developing a Blockchain-Based and Distributed Database-Oriented Multi-malware Detection Engine","authors":"S. Gupta, Parag P. Thakur, Kamal Biswas, Satyajeet Kumar, Aman Singh","doi":"10.1007/978-3-030-57024-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_11","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}