Browse Items (6 total)

6_Spam+Detection+in+Emails+Using+Machine+Learning.pdf
Despite the vast amounts of data available within email communication systems, spam remains a persistent issue, posing challenges for both users and organizations. Analyzing this data holds the potential to develop more effective methods for…

5_Visualization+of+Prediction+of+The+Spread+of+Covid-19+in+Indonesia+using+Cellular+Automata.pdf
The first case of COVID 19 was detected in Indonesia in early March 2020. One way to assist the government in making decisions to deal with COVID-19 is to create a map of the distribution of COVID-19 patients based on which can only be accessed by…

4_Optimized+Q-Learning-Based+Handover+Decision.pdf
The rapid growth of mobile devices and demand for mobile data have made maintaining capacity, high coverage, and data speed challenging. With the emergence of small cell networks, the Long-Term Evolution (LTE) system helped to address these issues,…

3_Legal+Frameworks+for+Digital+Space+Protection+in+Kenya.pdf
Strong cyber laws are necessary to protect digital spaces in Kenya, where the digital landscape is changing quickly. This need has grown. This article explores Kenya's legal framework for cyberspace, focusing on important topics such as privacy,…

2_File+Carving+Analyzing+Data+Retrieval+in+Digital+Forensics.pdf
In the current scenario, mostly the data are stored in digital media. Managing the storage and security of huge volume of data is emerging as a significant challenge for data science researchers and engineers. As data is considered as more costly and…

1_Enhancing+Cyber+Security+The+Role+of.pdf
Organizations must take proactive measures to strengthen their cybersecurity posture as cyber-attacks continue to develop and become more sophisticated. Networking, coordination, and the sharing of trustworthy information among entities and…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2