Open Access
REVIEW
Qasem Abu Al-Haija1,*, Shahad Al Tamimi2
1 Department of Cybersecurity, Faculty of Computer & Information Technology, Jordan University of Science and Technology, P.O. Box 3030, Irbid, 22110, Jordan
2 Department of Cybersecurity, King Hussein School of Computing Sciences, Princess Sumaya University for Technology, P.O. Box 1438, Amman, 11941, Jordan
* Corresponding Author: Qasem Abu Al-Haija. Email:
(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073540
Received 20 September 2025; Accepted 25 November 2025; Published online 26 December 2025
View
Download
Like
Stock Prediction Based on Technical Indicators Using Deep Learning Model
Manish Agrawal, Piyush Kumar Shukla,...Stock Market Trading Based on Market Sentiments and Reinforcement Learning
K. M. Ameen Suhail, Syam Sankar,...A New Fuzzy Adaptive Algorithm to Classify Imbalanced Data
Harshita Patel, Dharmendra Singh...Automatic Unusual Activities Recognition Using Deep Learning in Academia
Muhammad Ramzan, Adnan Abid, Shahid...Deep Learning with Backtracking Search Optimization Based Skin Lesion Diagnosis Model
C. S. S. Anupama, L. Natrayan,...