A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

A comprehensive survey for intelligent spam email detection

A Karim, S Azam, B Shanmugam, K Kannoorpatti… - Ieee …, 2019 - ieeexplore.ieee.org
The tremendously growing problem of phishing e-mail, also known as spam including spear
phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e …

An ensemble machine learning approach through effective feature extraction to classify fake news

S Hakak, M Alazab, S Khan, TR Gadekallu… - Future Generation …, 2021 - Elsevier
There are numerous channels available such as social media, blogs, websites, etc., through
which people can easily access the news. It is due to the availability of these platforms that …

Eppda: An efficient privacy-preserving data aggregation federated learning scheme

J Song, W Wang, TR Gadekallu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Federated learning (FL) is a kind of privacy-awaremachine learning, in which the machine
learning models are trained on the users' side and then the model updates are transmitted to …

A review of spam email detection: analysis of spammer strategies and the dataset shift problem

F Jáñez-Martino, R Alaiz-Rodríguez… - Artificial Intelligence …, 2023 - Springer
Spam emails have been traditionally seen as just annoying and unsolicited emails
containing advertisements, but they increasingly include scams, malware or phishing. In …

An intelligent system for spam detection and identification of the most relevant features based on evolutionary random weight networks

H Faris, AZ Ala'M, AA Heidari, I Aljarah, M Mafarja… - Information …, 2019 - Elsevier
With the incremental use of emails as an essential and popular communication mean over
the Internet, there comes a serious threat that impacts the Internet and the society. This …

Deep graph neural network-based spammer detection under the perspective of heterogeneous cyberspace

Z Guo, L Tang, T Guo, K Yu, M Alazab… - Future generation …, 2021 - Elsevier
Due to the severe threat to cyberspace security, detection of online spammers has been a
universal concern of academia. Nowadays, prevailing literature of this field almost leveraged …

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

S Ur Rehman, M Khaliq, SI Imtiaz, A Rasool… - Future Generation …, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

A Dahiya, BB Gupta - Future Generation Computer Systems, 2021 - Elsevier
DDoS attack is one of the most powerful cyber-weapons as it does not wait for a specific
server configuration or particular network state to attack or to disrupt any operation of the …

Security by design for big data frameworks over cloud computing

FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …