AES EncryptionPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
AI-Based Malware DetectionTowards Robust and Explainable AI-Based Malware Detection: A Survey of Adversarial Attacks, Defenses, and Open Challenges [(Articles in Press)]
Adversarial Evasion AttacksTowards Robust and Explainable AI-Based Malware Detection: A Survey of Adversarial Attacks, Defenses, and Open Challenges [(Articles in Press)]
Adversarial Machine LearningTowards Robust and Explainable AI-Based Malware Detection: A Survey of Adversarial Attacks, Defenses, and Open Challenges [(Articles in Press)]
CNNAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
CTMAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
ChatGPTLeveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
CorExAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
Cyber Threat DetectionLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
Cyber-attacksAn Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
D
Data MiningA Comprehensive Review of AI-Driven Data Mining Techniques [Volume 1, Issue 0, 2024, Pages 23-28]
Deep learningA Comprehensive Review of AI-Driven Data Mining Techniques [Volume 1, Issue 0, 2024, Pages 23-28]
Deep learningAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
Deep learningA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
Deep learningLeveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
Deep learningFire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
E
Educational TechnologyDynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
Internet of Things (IoT)An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
Intrusion Detection System (IDS)An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
K
K-means clusteringA Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
Keywords: educational data miningDynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
L
LSTM DeLSTM-Based Analysis of De-Identification Techniques for Protecting Sensitive Data [Volume 1, Issue 0, 2024, Pages 1-9]
Large Language Models (LLMs)Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Learn to LearnLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
Least Significant Bit (LSB)Hiding Encrypted Data In different image Types using spatial domain [Volume 1, Issue 0, 2024, Pages 47-55]
M
Machine Learning in SpeechIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Machine learningA Comprehensive Review of AI-Driven Data Mining Techniques [Volume 1, Issue 0, 2024, Pages 23-28]
Machine learningAn Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
Malware Analysis (Static Dynamic Hybrid)Towards Robust and Explainable AI-Based Malware Detection: A Survey of Adversarial Attacks, Defenses, and Open Challenges [(Articles in Press)]
Meta-LearningLearning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
Model Efficiency OptimizationTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Multimodal LearningA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
N
NLPPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
NPCR&UACIPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
Natural Language ProcessingTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Natural language InterfaceGenerative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
Network intrusion detectionA Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
OptimizationAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
P
PSNRPerformance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
Phishing URLsPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
Predictive AnalyticsA Comprehensive Review of AI-Driven Data Mining Techniques [Volume 1, Issue 0, 2024, Pages 23-28]
R
RNNAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
Research TrendsAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
Robust Defense MechanismsTowards Robust and Explainable AI-Based Malware Detection: A Survey of Adversarial Attacks, Defenses, and Open Challenges [(Articles in Press)]
S
SQLGenerative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
SSL MethodologiesIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Speech RecognitionIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
Squeeze and ExcitationFire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
Static analysisTailoring Static Code Analysis for Top 25 CWE in Python [Volume 1, Issue 0, 2024, Pages 47-56]
Swarm OptimizationAdvances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
T
Time Processing Sensor NetworksSelf-Supervised Learning for Speech Recognition: A Comprehensive Review [Volume 2, Issue 1, 2025, Pages 19-22]
Topic ModelingAI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
Transformer ArchitectureTrends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
Transformer ModelsA Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
U
URL AttacksPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
URL Feature ExtractionPhishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
Unlabelled DataIntegrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]