AES EncryptionPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
CNNAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
CTMAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
ChatGPTLeveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
CorExAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
Cyber Threat DetectionLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
Cyber-attacksAn Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
D
Deep learningAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
Deep learningA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
Deep learningLeveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
Deep learningFire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
E
Educational TechnologyDynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
Internet of Things (IoT)An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
Intrusion Detection System (IDS)An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
K
K-means clusteringA Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
Keywords: educational data miningDynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
L
Large Language Models (LLMs)Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Learn to LearnLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
M
Machine Learning in SpeechIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Machine learningAn Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
Meta-LearningLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
Model Efficiency OptimizationTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Multimodal LearningA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
N
NLPPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
NPCR&UACIPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
Natural Language ProcessingTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Natural language InterfaceGenerative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
Network intrusion detectionA Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
O
OptimizationAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
P
PSNRPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
Phishing URLsPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
R
RNNAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
Research TrendsAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
S
SQLGenerative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
SSL MethodologiesIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Speech RecognitionIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Squeeze and ExcitationFire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
Swarm OptimizationAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
T
Time Processing Sensor NetworksSelf-Supervised Learning for Speech Recognition: A Comprehensive Review [Volume 2, Issue 1, 2025, Pages 19-22]
Topic ModelingAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
Transformer ArchitectureTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Transformer ModelsA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
U
URL AttacksPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
URL Feature ExtractionPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
Unlabelled DataIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]