Kousik Barik
YOU?
Author Swipe
View article: Preparing Future Pharmacists to Identify and Address Intimate Partner Violence (IPV) in Pharmacy Practice
Preparing Future Pharmacists to Identify and Address Intimate Partner Violence (IPV) in Pharmacy Practice Open
Intimate partner violence (IPV) is a widespread public health issue impacting almost of half of individuals in the United States during their lifetime. Pharmacists' accessibility in communities and expanding provision of comprehensive sexu…
View article: A comprehensive defense approach of deep learning-based NIDS against adversarial attacks
A comprehensive defense approach of deep learning-based NIDS against adversarial attacks Open
Network intrusion detection systems (NIDS) act as a premier defense to protect computer networks from cybersecurity threats. In Adversarial Machine Learning (AML), adversaries aim to deceive Machine Learning (ML) and Deep Learning (DL) mod…
View article: Black-box adversarial attack defense approach: An empirical analysis from cybersecurity perceptive
Black-box adversarial attack defense approach: An empirical analysis from cybersecurity perceptive Open
View article: Web-based phishing URL detection model using deep learning optimization techniques
Web-based phishing URL detection model using deep learning optimization techniques Open
Phishing is a cyber-attack in which the attacker redirects Internet users to fraudulent websites. Fake websites look very similar to legitimate ones, leading users to trust them and disclose sensitive information. Despite the available met…
View article: Correction: A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Correction: A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks Open
View article: Digital Sovereignty in the Era of Industry 5.0: Challenges and Opportunities
Digital Sovereignty in the Era of Industry 5.0: Challenges and Opportunities Open
View article: A Comprehensive Review of Human-Centric AI, Regulatory Frameworks, and Their Role in Shaping Industry 5.0
A Comprehensive Review of Human-Centric AI, Regulatory Frameworks, and Their Role in Shaping Industry 5.0 Open
View article: A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks Open
AI techniques for cybersecurity are advancing, but AI-based classifiers are suspectable of adversarial attacks. It is challenging to quantify the efforts required of an adversary to manipulate a system and quantify this resilience such tha…
View article: Enhancing image data security using the APFB model
Enhancing image data security using the APFB model Open
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography recreates a critical function in safeguarding information from potential risks and confirming the identity of authorised individuals, thereby addr…
View article: Adversarial attack defense analysis: An empirical approach in cybersecurity perspective
Adversarial attack defense analysis: An empirical approach in cybersecurity perspective Open
View article: IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system
IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system Open
An intrusion detection system (IDS) is critical in protecting organizations from cyber threats. The susceptibility of Machine Learning and Deep Learning-based IDSs against adversarial attacks arises from malicious actors' deliberate constr…
View article: Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network Open
Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods, elevated false positive rates, absence of effective validation, and time-intensive processes. Thi…
View article: Analysis of customer reviews with an improved VADER lexicon classifier
Analysis of customer reviews with an improved VADER lexicon classifier Open
Background The importance of customer reviews in determining satisfaction has significantly increased in the digital marketplace. Using sentiment analysis in customer reviews has immense potential but encounters challenges owing to domain …
View article: RONSI: a framework for calculating return on network security investment
RONSI: a framework for calculating return on network security investment Open
This competitive environment is rapidly driving technological modernization. Sophisticated cyber security attacks are expanding exponentially, inflicting reputation damage and financial and economic loss. Since security investments may tak…
View article: A blockchain-based evaluation approach to analyse customer satisfaction using AI techniques
A blockchain-based evaluation approach to analyse customer satisfaction using AI techniques Open
View article: LSTM‐DGWO‐Based Sentiment Analysis Framework for Analyzing Online Customer Reviews
LSTM‐DGWO‐Based Sentiment Analysis Framework for Analyzing Online Customer Reviews Open
Sentiment analysis furnishes consumer concerns regarding products, enabling product enhancement development. Existing sentiment analysis using machine learning techniques is computationally intensive and less reliable. Deep learning in sen…
View article: Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study Open
Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked…
View article: Exploring user requirements of network forensic tools
Exploring user requirements of network forensic tools Open
Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out track…
View article: Penetration Testing Analysis with Standardized Report Generation
Penetration Testing Analysis with Standardized Report Generation Open
Penetration testing is a mirrored cyber-attack defined for identifying vulnerabilities and flaws in a computer system/Network/Web application-the organization appoints experts to conduct the test and present the details for deeper interpre…