Vol. 2 No. 1 (2024): Journal of Computing Innovations and Applications

Published: 2024-01-10

Articles

  • AI-Driven Threat Intelligence: Enhancing Cyber Defense with Machine Learning

    Rajendra Muppalaneni, Anil Chowdary Inaganti,  Nischal Ravichandran (Author)
    1-11
      Abstract View: 1112 |     Download: 963 |    
    DOI: https://doi.org/10.63575/
  • The Future of Management with Computing and Data-Driven Strategies

    Noiralih Guere Castellanos (Author)
    12-19
      Abstract View: 15 |     Download: 30 |    
    DOI: https://doi.org/10.63575/
  • Optimal Feature Selection for Market Risk Assessment: A Dimensional Reduction Approach in Quantitative Finance

    Zhonghao Wu, Zhen Feng, Boyang Dong (Author)
    20-31
      Abstract View: 212 |     Download: 273 |    
    DOI: https://doi.org/10.63575/CIA.2024.20103
  • Research on AI-Driven Personalized Web Interface Adaptation Strategies and User Satisfaction Evaluation

    Yumeng Wang, Xiaowen Ma, Lei Yan (Author)
    32-45
      Abstract View: 61 |     Download: 46 |    
    DOI: https://doi.org/10.63575/
  • Comparative Analysis of Foreign Exchange Market Shock Transmission and Recovery Resilience Among Major Economies Under Geopolitical Conflicts: Evidence from the Russia-Ukraine Crisis

    Aixin Kang, Shengjie Min, Dongchen Yuan (Author)
    46-61
      Abstract View: 21 |     Download: 38 |    
    DOI: https://doi.org/10.63575/
  • Enhancing Financial Audit Efficiency Through RPA Implementation: A Comparative Analysis in Manufacturing Industry

    Liya Ge (Author)
    62-73
      Abstract View: 21 |     Download: 15 |    
    DOI: https://doi.org/10.63575/CIA.2024.20106
  • Forecasting Hospital Resource Demand Using Gradient Boosting: An Operational Analytics Approach for Bed Allocation and Patient Flow Management

    Chuan Wu, Haoyang Guan, Haojun Weng (Author)
    74-85
      Abstract View: 24 |     Download: 8 |    
    DOI: https://doi.org/10.63575/CIA.2024.20107
  • Agentic AI Across Domains: A Comprehensive Review of Capabilities, Applications, and Future Directions

    Sida Zhang, Ruoxi Jia, Zan Li (Author)
    86-98
      Abstract View: 15 |     Download: 7 |    
    DOI: https://doi.org/10.63575/CIA.2024.20108
  • An Empirical Study of Large Language Models for Threat Intelligence Analysis and Incident Response

    Ruoxi Jia, Jin Zhang, Julian Prescot (Author)
    99-110
      Abstract View: 13 |     Download: 12 |    
    DOI: https://doi.org/10.63575/CIA.2024.20109
  • Comparative Analysis of Unsupervised Learning Approaches for Anomalous Billing Pattern Detection in Healthcare Payment Integrity

    Xiaotong Shi, Haojun Weng (Author)
    111-127
      Abstract View: 28 |     Download: 7 |    
    DOI: https://doi.org/10.63575/CIA.2024.20110
  • Explainable Attack Path Reasoning for Industrial Control Network Security Based on Knowledge Graphs

    Yanhuan Chen (Author)
    128-139
      Abstract View: 17 |     Download: 3 |    
    DOI: https://doi.org/10.63575/CIA.2024.20111
  • Feature-Based Detection of Bot Traffic and Click Fraud in Mobile Advertising: A Comparative Analysis

    Ruoxi Jia, Xin Lu, Serena Whitmore (Author)
    140-152
      Abstract View: 16 |     Download: 3 |    
    DOI: https://doi.org/10.63575/CIA.2024.20112
  • Graph-based Representation Learning for Financial Fraud and Anomaly Transaction Detection

    Chuanli Wei, Liya Ge, Nathan Brooks (Author)
    153-164
      Abstract View: 13 |     Download: 4 |    
    DOI: https://doi.org/10.63575/CIA.2024.20113