A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Cyber threat detection using machine learning techniques: A performance evaluation perspective
The present-day world has become all dependent on cyberspace for every aspect of daily
living. The use of cyberspace is rising with each passing day. The world is spending more …
living. The use of cyberspace is rising with each passing day. The world is spending more …
Fuz-spam: Label smoothing-based fuzzy detection of spammers in internet of things
Nowadays, online spamming has already been a remarkable threat to contents security of
Internet of Things. Due to constant technical progress, online spamming activities have been …
Internet of Things. Due to constant technical progress, online spamming activities have been …
Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest
Nowadays, there is a growing demand among Internet and social media users for improved
protection against spam. Despite numerous studies focused on spam detection, no …
protection against spam. Despite numerous studies focused on spam detection, no …
A survey on event tracking in social media data streams
Z Han, L Shi, L Liu, L Jiang, J Fang… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
Social networks are inevitable parts of our daily life, where an unprecedented amount of
complex data corresponding to a diverse range of applications are generated. As such, it is …
complex data corresponding to a diverse range of applications are generated. As such, it is …
[PDF][PDF] Critical evaluation on spam content detection in social media
AR Chrismanto, K Sari, Y Suyanto - J. Theor. Appl. Inf. Technol, 2022 - jatit.org
The spam content detection problem is still challenging due to its complexity, feature
extraction process, language, context-aware detection capabilities, performance, and …
extraction process, language, context-aware detection capabilities, performance, and …
Normalization of abbreviation and acronym on Microtext in Bahasa Indonesia by using dictionary-based and longest common subsequence (LCS)
D Gunawan, Z Saniyah, A Hizriadi - Procedia Computer Science, 2019 - Elsevier
The communication nowadays has reached a need to express the idea in short text. This
kind of communication is delivered in various media such as short messages service (SMS) …
kind of communication is delivered in various media such as short messages service (SMS) …
Sensitive keyword extraction based on cyber keywords and LDA in Twitter to avoid regrets
R Geetha, S Karthika - Computational Intelligence in Data Science: Third …, 2020 - Springer
Twitter is the most popular social platform where common people reflect their personal,
political and business views that obliquely build an active online repository. The data …
political and business views that obliquely build an active online repository. The data …
An interpretable wide and deep model for online disinformation detection
The advent of the internet has facilitated the wide spread of online disinformation and thus
poses severe threats to the trustworthiness of cyberspace. Two types of methods are …
poses severe threats to the trustworthiness of cyberspace. Two types of methods are …
Separation of Incoming E-Mails Through Artificial Intelligence Techniques
M Yağanoğlu, E Irmak - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Technological developments are making individuals and organizations ever more
dependent on e-mail to communicate and share information. Increasing use of e-mail as an …
dependent on e-mail to communicate and share information. Increasing use of e-mail as an …