A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Cyber threat detection using machine learning techniques: A performance evaluation perspective

K Shaukat, S Luo, S Chen, D Liu - … international conference on …, 2020 - ieeexplore.ieee.org
The present-day world has become all dependent on cyberspace for every aspect of daily
living. The use of cyberspace is rising with each passing day. The world is spending more …

Fuz-spam: Label smoothing-based fuzzy detection of spammers in internet of things

Z Guo, K Yu, A Jolfaei, F Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, online spamming has already been a remarkable threat to contents security of
Internet of Things. Due to constant technical progress, online spamming activities have been …

Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest

M Kihal, L Hamza - Multimedia Tools and Applications, 2023 - Springer
Nowadays, there is a growing demand among Internet and social media users for improved
protection against spam. Despite numerous studies focused on spam detection, no …

A survey on event tracking in social media data streams

Z Han, L Shi, L Liu, L Jiang, J Fang… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
Social networks are inevitable parts of our daily life, where an unprecedented amount of
complex data corresponding to a diverse range of applications are generated. As such, it is …

[PDF][PDF] Critical evaluation on spam content detection in social media

AR Chrismanto, K Sari, Y Suyanto - J. Theor. Appl. Inf. Technol, 2022 - jatit.org
The spam content detection problem is still challenging due to its complexity, feature
extraction process, language, context-aware detection capabilities, performance, and …

Normalization of abbreviation and acronym on Microtext in Bahasa Indonesia by using dictionary-based and longest common subsequence (LCS)

D Gunawan, Z Saniyah, A Hizriadi - Procedia Computer Science, 2019 - Elsevier
The communication nowadays has reached a need to express the idea in short text. This
kind of communication is delivered in various media such as short messages service (SMS) …

Sensitive keyword extraction based on cyber keywords and LDA in Twitter to avoid regrets

R Geetha, S Karthika - Computational Intelligence in Data Science: Third …, 2020 - Springer
Twitter is the most popular social platform where common people reflect their personal,
political and business views that obliquely build an active online repository. The data …

An interpretable wide and deep model for online disinformation detection

Y Chai, Y Liu, W Li, B Zhu, H Liu, Y Jiang - Expert Systems with Applications, 2024 - Elsevier
The advent of the internet has facilitated the wide spread of online disinformation and thus
poses severe threats to the trustworthiness of cyberspace. Two types of methods are …

Separation of Incoming E-Mails Through Artificial Intelligence Techniques

M Yağanoğlu, E Irmak - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Technological developments are making individuals and organizations ever more
dependent on e-mail to communicate and share information. Increasing use of e-mail as an …