Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile Application Infrastructure Security |
Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA |
Volume : 16 volume number : 1 pdf |
Image Segmentation and Classification using Neural Network |
Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh |
Volume : 16 volume number : 1 pdf |
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics |
Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA |
Volume : 16 volume number : 1 pdf |
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 |
Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA |
Volume : 16 volume number : 1 pdf |
Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning |
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA |
Volume : 16 volume number : 1 pdf |