Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

Detecting fake news in social media networks

M Aldwairi, A Alwahedi - Procedia Computer Science, 2018 - Elsevier
Fake news and hoaxes have been there since before the advent of the Internet. The widely
accepted definition of Internet fake news is: fictitious articles deliberately fabricated to …

Malware threat analysis techniques and approaches for iot applications: A review

CC Uchenna, N Jamil, R Ismail, LK Yan… - Bulletin of Electrical …, 2021 - beei.org
Internet of things (IoT) is a concept that has been widely used to improve business efficiency
and customer's experience. It involves resource constrained devices connecting to each …

Malicious domain detection using machine learning on domain name features, host-based features and web-based features

G Palaniappan, S Sangeetha, B Rajendran… - Procedia Computer …, 2020 - Elsevier
Internet has plenty of vulnerabilities which are exploited by cyber criminals to send spam,
commit financial frauds, perform phishing, indulge in command & control, disseminate …

Hate speech classification using SVM and naive BAYES

DC Asogwa, CI Chukwuneke, CC Ngene… - arXiv preprint arXiv …, 2022 - arxiv.org
The spread of hatred that was formerly limited to verbal communications has rapidly moved
over the Internet. Social media and community forums that allow people to discuss and …

A comparison of machine learning attributes for detecting malicious websites

AK Singh, N Goyal - 2019 11th International Conference on …, 2019 - ieeexplore.ieee.org
The number of Malicious Websites has increased manifold in the past few years. As on start
of year 2018, 1 in every 13 URL was malicious, amounting to 7.8% URLs identified as …

[PDF][PDF] MTA-KDD'19: A Dataset for Malware Traffic Detection.

I Letteri, G Della Penna, L Di Vita, MT Grifa - Itasec, 2020 - ricerca.univaq.it
In the present paper we describe a new, updated and refined dataset specifically tailored to
train and evaluate machine learning based malware traffic analysis algorithms. To generate …

[HTML][HTML] Identifying malicious accounts in blockchains using domain names and associated temporal properties

RK Sachan, R Agarwal, SK Shukla - Blockchain: Research and …, 2023 - Elsevier
The rise in the adoption of blockchain technology has led to increased illegal activities by
cybercriminals costing billions of dollars. Many machine learning algorithms are applied to …

COVID-19 prediction with Chest X-Ray images using CNN

P Maddula, P Srikanth, PK Sree… - … on Intelligent and …, 2023 - ieeexplore.ieee.org
Coronavirus has outbreak as an epidemic disease, created a pandemic situation for the
public health across the Globe. Screening for the large masses is extremely crucial to control …

[HTML][HTML] Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods

S Ndichu, S Kim, S Ozawa, T Ban, T Takahashi… - Applied Sciences, 2021 - mdpi.com
Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to
perpetrate malicious activities on the Internet are rampant and continuously evolving …