Deep learning models for binary ddos attack detection in enterprise environmentsYacouba OUATTARA Yaya TRAORE Yves SAVADOGOEnhancing the security of the MQTT protocol in the Internet of Things using the Syracuse conjectureOUATTARA Yacouba, COMPAORE Ousmane, OUEDRAOGO Victor, TRAORE YayaArtificial intelligence for IoT threat detection: Case of DDoS attacksDr. Yacouba OUATTARA Dr. Yaya TRAORE D. Moumine Arthur OUEDRAOGOCross-Analysis of Social Media Opinions in a High-Security Challenge ContextZombre Payiri Gregoire Wenceslas; Traore Yaya; P. Justin KouraogoTowards a Framework for the Preparation of High Quality Data for Use by Machine Learning AlgorithmsNabi, R., Traoré, Y., Thiombiano, J. |