<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19632" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19632?output=omeka-xml" accessDate="2026-05-01T09:26:59+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170451">
              <text>Digital Transaction Cyber-Attack Detection Using Particle Swarm Optimization</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170452">
              <text>Cyber-attacks; Deep Learning; Digital Transaction; Genetic Algorithm; Machine Learning; Particle Swarm Optimization</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170453">
              <text>The cyber digital world is an essential variant in day-to-day life in advanced technology. There is a better change in the lifestyle as intelligent technology. In larger excite to increase the advanced technology which can be developed to humans in major dependent on network and internet users. Now, in modern times, the internet has changed the primary need in human lifestyle by giving access to everything in the world while sitting in one place knowing and updating the information and usage of online subscribers or Revolution. The world is moving in Rapid and Faster communications within a fraction of a second, at a lesser cost, and it has minimal paper-based processes and relies on the digitization document instead of a paperless environment. The data is handled by finch security practices, which are used in security worldwide to establish protected data management systems like digital lending, credits, mobile Banking, and mobile payment. Cryptocurrency and blockchain, B-trading, and banking as a service are included. At the same time, leveraging the new technologies is to resist hacking cyber-attacks. This article is also involved in artificial intelligence and machine learning (AI&amp;amp;ML) in different cyber-attacks. This article focuses on genetic algorithms to detect the cyber-attack. The main aim of the detection is future to prevent these cyber-attacks. The comparison will take two sample genetic algorithms. The first one is taken for Ant Colony Optimization (ACO), and the proposed model is taken for Particle Swarm Optimization. The average attack detection of ACO algorithm is 45 packets at the same time PSO algorithm will detect 50 packets.   2023 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170454">
              <text>Monisha N.; Gunvanth G.; Jayapandian N.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="170455">
              <text>Proceedings of the 4th IEEE International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2023</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="170456">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170457">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="170458">
              <text>&lt;a href="https://doi.org/10.1109/ICSTCEE60504.2023.10585244" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICSTCEE60504.2023.10585244&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85199521985&amp;amp;doi=10.1109%2FICSTCEE60504.2023.10585244&amp;amp;partnerID=40&amp;amp;md5=14e5f9ec60fd6765d1dc5f1c63aef8a9" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85199521985&amp;amp;doi=10.1109%2fICSTCEE60504.2023.10585244&amp;amp;partnerID=40&amp;amp;md5=14e5f9ec60fd6765d1dc5f1c63aef8a9&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170459">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="170460">
              <text>ISBN: 979-835038462-8</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170461">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170462">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170463">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="170464">
              <text>Monisha N., Christ (Deemed To Be University), Department Of Cse, India; Gunvanth G., Christ (Deemed To Be University), Department Of Civil Engineering, India; Jayapandian N., Christ (Deemed To Be University), Department Of Cse, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
