标题
Recent Advancements in Machine Learning for Cybercrime Prediction
作者
关键词
-
出版物
JOURNAL OF COMPUTER INFORMATION SYSTEMS
Volume -, Issue -, Pages 1-15
出版商
Informa UK Limited
发表日期
2023-10-24
DOI
10.1080/08874417.2023.2270457
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach
- (2023) Arvind Kumar Gautam et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
- (2023) Ömer Aslan et al. Electronics
- Automatic Cyberstalking Detection on Twitter in Real-Time using Hybrid Approach
- (2023) Arvind Kumar Gautam et al. International Journal of Modern Education and Computer Science
- Deep learning approaches for detecting DDoS attacks: a systematic review
- (2022) Meenakshi Mittal et al. SOFT COMPUTING
- EfficientNet convolutional neural networks-based Android malware detection
- (2022) Pooja Yadav et al. COMPUTERS & SECURITY
- GLD-Net: Deep Learning to Detect DDoS Attack via Topological and Traffic Feature Fusion
- (2022) Wei Guo et al. Computational Intelligence and Neuroscience
- Phishing URL detection using machine learning methods
- (2022) SK Hasane Ahammad et al. ADVANCES IN ENGINEERING SOFTWARE
- Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system
- (2022) Vinayakumar Ravi et al. COMPUTERS & ELECTRICAL ENGINEERING
- COVID-19 malicious domain names classification
- (2022) Paul K. Mvula et al. EXPERT SYSTEMS WITH APPLICATIONS
- Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic features
- (2022) Yiwei Hou et al. INFORMATION PROCESSING & MANAGEMENT
- Malware detection using image representation of malware data and transfer learning
- (2022) Furqan Rustam et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- DDoS attacks in IoT networks: a comprehensive systematic literature review
- (2021) Yahya Al-Hadhrami et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- AI@TSS- Intelligent technical support scam detection system
- (2021) Yu-Chen Chen et al. Journal of Information Security and Applications
- Machine learning with digital forensics for attack classification in cloud network environment
- (2021) Shaweta Sachdeva et al. International Journal of System Assurance Engineering and Management
- SSAPPIDENTIFY: A robust system identifies application over Shadowsocks’s traffic
- (2021) Suixing Wang et al. Computer Networks
- Sustaining accurate detection of phishing URLs using SDN and feature selection approaches
- (2021) Raniyah Wazirali et al. Computer Networks
- Applying machine learning and natural language processing to detect phishing email
- (2021) Areej Alhogail et al. COMPUTERS & SECURITY
- Deep transfer learning framework for the identification of malicious activities to combat cyberattack
- (2021) Deepak Singh et al. Future Generation Computer Systems-The International Journal of eScience
- MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things
- (2021) Sudhakar et al. Future Generation Computer Systems-The International Journal of eScience
- DTMIC: Deep transfer learning for malware image classification
- (2021) Sanjeev Kumar et al. Journal of Information Security and Applications
- Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions
- (2021) Mamoun Alazab et al. IEEE Transactions on Industrial Informatics
- Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning
- (2021) Vinayakumar Ravi et al. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT
- Improving cyberbullying detection using Twitter users’ psychological features and machine learning
- (2020) Vimala Balakrishnan et al. COMPUTERS & SECURITY
- Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
- (2020) Jinsoo Hwang et al. WIRELESS PERSONAL COMMUNICATIONS
- Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems
- (2020) Hichem Sedjelmaci et al. IEEE NETWORK
- De-Wipimization: Detection of data wiping traces for investigating NTFS file system
- (2020) Dong Bin Oh et al. COMPUTERS & SECURITY
- Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
- (2020) Xiaoqing Sun et al. COMPUTERS & SECURITY
- Recurrent neural network for detecting malware
- (2020) Sudan Jha et al. COMPUTERS & SECURITY
- Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
- (2020) Jiao Yin et al. KNOWLEDGE-BASED SYSTEMS
- A lightweight cyber security framework with context-awareness for pervasive computing environments
- (2020) Jalal Al-Muhtadi et al. Sustainable Cities and Society
- Recognizing roles of online illegal gambling participants: An ensemble learning approach
- (2019) Xiaohui Han et al. COMPUTERS & SECURITY
- A Survey of Random Forest Based Methods for Intrusion Detection Systems
- (2018) Paulo Angelo Alves Resende et al. ACM COMPUTING SURVEYS
- Compromised user credentials detection in a digital enterprise using behavioral analytics
- (2018) Saleh Shah et al. Future Generation Computer Systems-The International Journal of eScience
- A novel support vector machine based intrusion detection system for mobile ad hoc networks
- (2017) Erfan A. Shams et al. WIRELESS NETWORKS
- Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement
- (2013) David Moher ANNALS OF INTERNAL MEDICINE
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started