A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning

M Nkongolo, JP Van Deventer, SM Kasongo, SR Zahra… - Electronics, 2022 - mdpi.com
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …

Using arima to predict the growth in the subscriber data usage

M Nkongolo - Eng, 2023 - mdpi.com
Telecommunication companies collect a deluge of subscriber data without retrieving
substantial information. Exploratory analysis of this type of data will facilitate the prediction of …

Cybersecurity Career Requirements: A Literature Review

M Nkongolo, N Mennega, I van Zyl - arXiv preprint arXiv:2306.09599, 2023 - arxiv.org
This study employs a systematic literature review approach to identify the requirements of a
career as a cybersecurity professional. It aims to raise public awareness regarding …

News Classification and Categorization with Smart Function Sentiment Analysis

M Nkongolo Wa Nkongolo - International Journal of Intelligent …, 2023 - Wiley Online Library
Search engines are tools used to find information on the Internet. Since the web has a
plethora of websites, the engine queries the majority of active sites and builds a database …

Using deep packet inspection data to examine subscribers on the network

M Nkongolo, JP van Deventer, SM Kasongo - Procedia Computer Science, 2022 - Elsevier
This article proposes the creation of the deep packet inspection (DPI) dataset to study
subscribers' behavior on the network, applying ensemble learning to this dataset, and …

Fuzzification-based feature selection for enhanced website content encryption

M Nkongolo - arXiv preprint arXiv:2306.13548, 2023 - arxiv.org
We propose a novel approach that utilizes fuzzification theory to perform feature selection on
website content for encryption purposes. Our objective is to identify and select the most …

Fuzzy feature selection with key-based cryptographic transformations

M Nkongolo - arXiv preprint arXiv:2306.09583, 2023 - arxiv.org
In the field of cryptography, the selection of relevant features plays a crucial role in
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …

Enhancing search engine precision and user experience through sentiment-based polysemy resolution

M Nkongolo - arXiv preprint arXiv:2311.01895, 2023 - arxiv.org
With the proliferation of digital content and the need for efficient information retrieval, this
study's insights can be applied to various domains, including news services, e-commerce …

Using ARIMA to Predict the Expansion of Subscriber Data Consumption

MW Nkongolo - arXiv preprint arXiv:2404.15095, 2024 - arxiv.org
This study discusses how insights retrieved from subscriber data can impact decision-
making in telecommunications, focusing on predictive modeling using machine learning …

基于改进遗传算法的入侵检测技术的设计与实现

王硕, 李成杰, 崔丽琪, 李聪, 乐秀权… - Journal of terahertz …, 2024 - opticsjournal.net
摘要天地一体化网络处在开放的电磁环境中, 会时常遭受恶意网络入侵. 为解决网络中绕过安全
机制的非授权行为对系统进行攻击的问题, 提出一种改进的遗传算法. 该算法以决策树算法为 …