Maintaining
cultural
and
linguistic
diversity
is
a
challenge
in
an
increasingly
digital
world.
For
language
like
Bangla,
with
rich
script
heritage,
preserving
the
essence
of
handwritten
text
crucial.
The
research
employs
Deep
Learning
algorithm,
to
decipher
nuances
Bangla
script.
algorithm
learns
mimic
fluid
strokes,
unique
characters,
artistic
intrinsic
through
extensive
training
on
authentic
dataset.
To
democratize
use
this
technology,
user-friendly
model
interface
for
generating
developed.
This
allows
users,
regardless
technical
expertise,
seamlessly
recognize
into
beautiful
imagery.
However,
Bangla's
beauty
not
just
act
conservation;
it's
testament
our
commitment
diversity.
paper
addresses
by
proposing
novel
approach
recognizing
image
format,
leveraging
Future Internet,
Journal Year:
2025,
Volume and Issue:
17(1), P. 25 - 25
Published: Jan. 8, 2025
The
rapid
evolution
of
technologies
such
as
the
Internet
Things
(IoT),
5G,
and
cloud
computing
has
exponentially
increased
complexity
cyber
attacks.
Modern
Intrusion
Detection
Systems
(IDSs)
must
be
capable
identifying
not
only
frequent,
well-known
attacks
but
also
low-frequency,
subtle
intrusions
that
are
often
missed
by
traditional
systems.
challenge
is
further
compounded
fact
most
IDS
rely
on
black-box
machine
learning
(ML)
deep
(DL)
models,
making
it
difficult
for
security
teams
to
interpret
their
decisions.
This
lack
transparency
particularly
problematic
in
environments
where
quick
informed
responses
crucial.
To
address
these
challenges,
we
introduce
XI2S-IDS
framework—an
Explainable,
Intelligent
2-Stage
System.
framework
uniquely
combines
a
two-stage
approach
with
SHAP-based
explanations,
offering
improved
detection
interpretability
low-frequency
Binary
classification
conducted
first
stage
followed
multi-class
second
stage.
By
leveraging
SHAP
values,
enhances
decision-making,
allowing
analysts
gain
clear
insights
into
feature
importance
model’s
rationale.
Experiments
UNSW-NB15
CICIDS2017
datasets
demonstrate
significant
improvements
performance,
notable
reduction
false
negative
rates
attacks,
while
maintaining
high
precision,
recall,
F1-scores.
Sensors,
Journal Year:
2025,
Volume and Issue:
25(5), P. 1610 - 1610
Published: March 6, 2025
This
paper
presents
a
comparative
analysis
of
selected
deep
learning
methods
applied
to
anomaly
detection
in
data
streams.
The
results
obtained
on
the
popular
Yahoo!
Webscope
S5
dataset
are
used
for
computational
experiments.
two
commonly
and
recommended
models
literature,
which
basis
this
analysis,
following:
LSTM
its
more
complicated
variant,
autoencoder.
Additionally,
usefulness
an
innovative
LSTM-CNN
approach
is
evaluated.
indicate
that
can
successfully
be
streams
as
performance
compares
favorably
with
mentioned
standard
models.
For
evaluation,
F1score
used.
Journal of Computer Security,
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 13, 2025
The
growing
prevalence
of
encrypted
malicious
network
traffic
poses
significant
challenges
for
cybersecurity,
as
it
conceals
the
content
from
traditional
detection
methods.
Temporal
convolutional
networks
(TCNs)
present
promising
capabilities
extracting
complex
temporal
features
and
patterns
dynamic
flow
data.
However,
unidirectional
nature
TCNs
limits
their
effectiveness
in
capturing
full
context
traffic,
which
often
exhibits
bidirectional
dependencies.
Consequently,
a
few
studies
have
proposed
TCN
(BiTCN)
architectures
to
address
limitations.
these
methods
that
require
amount
parameters
be
learned,
imposes
high
memory
requirements
on
computational
resources
training
such
models.
In
this
study,
we
introduce
efficient
(eBiTCN)
model,
an
BiTCN
requires
fewer
yet
not
at
expense
cost
effective
detection.
eBiTCN
framework
combines
processor,
lightweight
gating
mechanism,
attention,
dropout,
novel
loss
function,
dense
layers.
Extensive
experiments
show
outperforms
eight
state-of-the-art
competing
models
terms
efficacy,
speed,
scalability.
model
showcased
robust
performance
detecting
evolving
attacks
excelled
across
various
real-world
datasets.
Its
efficiency
speed
reduced
usage
translates
lower
infrastructure
costs,
making
accessible
choice
deployment.
These
findings
highlight
eBiTCN’s
practicality
dependability
addressing
contemporary
security
needs.