A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …
called UGRansome1819. The primary objective of the research is to classify potential …
Using arima to predict the growth in the subscriber data usage
M Nkongolo - Eng, 2023 - mdpi.com
Telecommunication companies collect a deluge of subscriber data without retrieving
substantial information. Exploratory analysis of this type of data will facilitate the prediction of …
substantial information. Exploratory analysis of this type of data will facilitate the prediction of …
Cybersecurity Career Requirements: A Literature Review
M Nkongolo, N Mennega, I van Zyl - arXiv preprint arXiv:2306.09599, 2023 - arxiv.org
This study employs a systematic literature review approach to identify the requirements of a
career as a cybersecurity professional. It aims to raise public awareness regarding …
career as a cybersecurity professional. It aims to raise public awareness regarding …
News Classification and Categorization with Smart Function Sentiment Analysis
M Nkongolo Wa Nkongolo - International Journal of Intelligent …, 2023 - Wiley Online Library
Search engines are tools used to find information on the Internet. Since the web has a
plethora of websites, the engine queries the majority of active sites and builds a database …
plethora of websites, the engine queries the majority of active sites and builds a database …
Using deep packet inspection data to examine subscribers on the network
This article proposes the creation of the deep packet inspection (DPI) dataset to study
subscribers' behavior on the network, applying ensemble learning to this dataset, and …
subscribers' behavior on the network, applying ensemble learning to this dataset, and …
Fuzzification-based feature selection for enhanced website content encryption
M Nkongolo - arXiv preprint arXiv:2306.13548, 2023 - arxiv.org
We propose a novel approach that utilizes fuzzification theory to perform feature selection on
website content for encryption purposes. Our objective is to identify and select the most …
website content for encryption purposes. Our objective is to identify and select the most …
Fuzzy feature selection with key-based cryptographic transformations
M Nkongolo - arXiv preprint arXiv:2306.09583, 2023 - arxiv.org
In the field of cryptography, the selection of relevant features plays a crucial role in
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
Enhancing search engine precision and user experience through sentiment-based polysemy resolution
M Nkongolo - arXiv preprint arXiv:2311.01895, 2023 - arxiv.org
With the proliferation of digital content and the need for efficient information retrieval, this
study's insights can be applied to various domains, including news services, e-commerce …
study's insights can be applied to various domains, including news services, e-commerce …
Using ARIMA to Predict the Expansion of Subscriber Data Consumption
MW Nkongolo - arXiv preprint arXiv:2404.15095, 2024 - arxiv.org
This study discusses how insights retrieved from subscriber data can impact decision-
making in telecommunications, focusing on predictive modeling using machine learning …
making in telecommunications, focusing on predictive modeling using machine learning …
基于改进遗传算法的入侵检测技术的设计与实现
王硕, 李成杰, 崔丽琪, 李聪, 乐秀权… - Journal of terahertz …, 2024 - opticsjournal.net
摘要天地一体化网络处在开放的电磁环境中, 会时常遭受恶意网络入侵. 为解决网络中绕过安全
机制的非授权行为对系统进行攻击的问题, 提出一种改进的遗传算法. 该算法以决策树算法为 …
机制的非授权行为对系统进行攻击的问题, 提出一种改进的遗传算法. 该算法以决策树算法为 …