A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A study on credit scoring modeling with different feature selection and machine learning approaches

SK Trivedi - Technology in Society, 2020 - Elsevier
A bit hurdle for financial institutions is to decide potential candidates to give a line of credit
identifying the right people without any credit risk. For such a crucial decision, past …

[HTML][HTML] A multi class random forest (MCRF) model for classification of small plant peptides

A Tripathi, T Goswami, SK Trivedi… - International Journal of …, 2021 - Elsevier
Research on the classification of the different categories of small peptides is becoming a
challenge for bioinformatics domain. However, machine learning models have shown their …

Hybrid water cycle optimization algorithm with simulated annealing for spam e-mail detection

G Al-Rawashdeh, R Mamat, NHB Abd Rahim - IEEE Access, 2019 - ieeexplore.ieee.org
Spam is defined as junk and unwanted e-mail. The implementation of a reliable spam email
filter becomes more and more important for e-mail users since they have to face with the …

An empirical study of supervised email classification in Internet of Things: practical performance and key influencing factors

W Li, L Ke, W Meng, J Han - International Journal of Intelligent …, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) is gradually adopted by many organizations to facilitate the
information collection and sharing. In an organization, an IoT node usually can receive and …

Spam emails in academia: issues and costs

JA Teixeira da Silva, A Al-Khatib, P Tsigaris - Scientometrics, 2020 - Springer
Academic research output is increasing at a very fast growth rate per year. Given this
expansion, new publishers will enter the market or existing publishers will introduce new …

Trust-aware detection of malicious users in dating social networks

X Shen, W Lv, J Qiu, A Kaur, F Xiao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Online dating is an increasingly thriving business which boosts billion-dollar revenues and
attracts users in the tens of millions. Despite its popularity, internet dating is not exempt from …

Modeling user preferences in online stores based on user mouse behavior on page elements

S SadighZadeh, M Kaedi - Journal of Systems and Information …, 2022 - emerald.com
Purpose Online businesses require a deep understanding of their customers' interests to
innovate and develop new products and services. Users, on the other hand, rarely express …

The use of stemming in the Arabic text and its impact on the accuracy of classification

J Atwan, M Wedyan, Q Bsoul… - Scientific …, 2021 - Wiley Online Library
The ongoing growth in the vast amount of digital documents and other data in the Arabic
language available online has increased the need for classification methods that can deal …

Email spam detection using multi-head CNN-BiGRU network

A Gupta, J Patil, S Soni, A Rajan - International Conference on Advanced …, 2022 - Springer
Spam emails refer to unsolicited email messages, usually sent in bulk to a large list of
recipients with the purpose of marketing, or luring individuals to download malware or click …