-
1Academic Journal
Source: IEEE Transactions on Computational Social Systems. 11:5028-5037
Subject Terms: Artificial neural network, Artificial intelligence, Support vector machine, Naive Bayes classifier, Computer Networks and Communications, Offensive Language, Natural language processing, 4. Education, 16. Peace & justice, Computer science, 3. Good health, Detection, Artificial Intelligence, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Machine learning, 8. Economic growth, Automated Detection of Hate Speech and Offensive Language, Network Intrusion Detection and Defense Mechanisms, Hate Speech, Botnet Detection, 10. No inequality, Natural Language Processing, Random forest
-
2Academic Journal
Source: IET Networks, Vol 13, Iss 5-6, Pp 339-376 (2024)
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Computer Science - Cryptography and Security, Outlier Detection, Computer Networks and Communications, TK5101-6720, Systems and Control (eess.SY), Anomaly detection, Electrical Engineering and Systems Science - Systems and Control, Anomaly Detection in High-Dimensional Data, Traffic Analysis, Artificial Intelligence, computer network security, FOS: Electrical engineering, electronic engineering, information engineering, Anomaly-based intrusion detection system, Data mining, Intrusion detection system, Computer science, Intrusion Detection, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Telecommunication, Network Intrusion Detection and Defense Mechanisms, Anomaly Detection, computer networks, Botnet Detection, Cryptography and Security (cs.CR)
Linked Full TextAccess URL: http://arxiv.org/abs/2308.02805
https://doaj.org/article/fb47601826e4494991980cd451b5df62 -
3Academic Journal
Authors: Umar Ibrahim, Usman Lawal Gulma, Ishaq Abdullahi Lawal
Source: International Journal of Science and Research Archive. 11:1146-1152
Subject Terms: 9. Industry and infrastructure, Communication, 4. Education, Social Sciences, Speech recognition, 16. Peace & justice, Voice activity detection, Computer science, FOS: Sociology, Data science, Social media, World Wide Web, Big data, Sociology, Artificial Intelligence, Machine Learning for Internet Traffic Classification, Speech processing, Computer Science, Physical Sciences, 8. Economic growth, Automated Detection of Hate Speech and Offensive Language, Internet privacy, The Impact of Digital Media on Public Discourse, 10. No inequality, Data mining
-
4Academic Journal
Authors: Md Jobair Hossain Faruk, Fazlul Alam, Mazharul Islam, Akond Rahman
Source: Cluster Computing. 27:4015-4034
Linked Full TextSubject Terms: FOS: Computer and information sciences, User Authentication Methods and Security Measures, FOS: Political science, FOS: Law, 02 engineering and technology, Transparency (behavior), Blockchain, Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Political science, Authentication, Politics, Blockchain and Internet of Things Integration, Continuous Authentication, 16. Peace & justice, Computer science, Biometrics, Machine Learning for Internet Traffic Classification, E-Voting, Computer Science, Physical Sciences, Internet privacy, Voting, Law, Information Systems
-
5Academic Journal
Authors: Van An Le, Yusheng Ji, Hoang The Tran, Phi Le Nguyen, John C. S. Lui
Source: IEEE Transactions on Network and Service Management. 21:1534-1549
Subject Terms: Computer Networks and Communications, End-to-End Congestion Control in Networks, Social Sciences, Network traffic simulation, 7. Clean energy, Real-time computing, Traffic engineering, Traffic Analysis, Traffic Management, Artificial Intelligence, Dynamics of Urban Structure through Spatial Network Analysis, Routing (electronic design automation), Computer network, Network packet, Computer science, Spatial Network Analysis, Network traffic control, Urban Studies, Overhead (engineering), Operating system, Machine Learning for Internet Traffic Classification, Traffic generation model, Computer Science, Physical Sciences, Delay Analysis, Encrypted Traffic
-
6Academic Journal
Authors: V. А. Herasimau, М. А. Kazlouski
Source: Цифровая трансформация, Vol 30, Iss 1, Pp 52-62 (2024)
Subject Terms: electronic voting, FOS: Political science, Geometry, FOS: Law, Information technology, 7. Clean energy, personal data protection, Artificial Intelligence, Computer security, authentication protocol, FOS: Mathematics, Cloud computing, Political science, signature activation protocol, electronic digital signature, Signature (topology), Digital Image Watermarking Techniques, Electronic voting, Electronic signature, Politics, T58.5-58.64, Computer science, Process (computing), cloud signature system, Operating system, Machine Learning for Internet Traffic Classification, E-Voting, Computer Science, Physical Sciences, Computer Vision and Pattern Recognition, Voting, Law, Mathematics
-
7Academic Journal
Authors: Yakubu Imrana, Yanping Xiang, Liaqat Ali, Adeeb Noor, Kwabena Sarpong, Muhammed Amin Abdullah
Source: Complex & Intelligent Systems, Vol 10, Iss 3, Pp 3353-3370 (2024)
Linked Full TextSubject Terms: Artificial neural network, Artificial intelligence, Class imbalance, Computer Networks and Communications, Feature (linguistics), Convolutional neural network, Information technology, 02 engineering and technology, Deep neural network, Pattern recognition (psychology), Gated recurrent unit, Layer (electronics), Characterization and Detection of Android Malware, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, Nanotechnology, Computational intelligence, Feature fusion, FOS: Nanotechnology, 9. Industry and infrastructure, Intrusion detection system, Linguistics, QA75.5-76.95, T58.5-58.64, Computer science, Materials science, Intrusion Detection, FOS: Philosophy, ethics and religion, Network Security, Detection, Philosophy, Machine Learning for Internet Traffic Classification, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, FOS: Languages and literature, Security Analysis, Botnet Detection, Network intrusion detection
-
8Academic Journal
Authors: Tzer‐Long Chen, Chia‐Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu
Source: International Journal of Information Security. 23:2637-2654
Linked Full TextSubject Terms: Secure Multi-party Computation, FOS: Political science, FOS: Law, 02 engineering and technology, 7. Clean energy, Artificial Intelligence, Computer security, Bullet voting, 0202 electrical engineering, electronic engineering, information engineering, Business, Coercion (linguistics), Political science, Order (exchange), Secure Computation, Advanced Cryptographic Schemes and Protocols, Electronic voting, Politics, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Linguistics, Volition (linguistics), 16. Peace & justice, Computer science, Cardinal voting systems, FOS: Philosophy, ethics and religion, Philosophy, Machine Learning for Internet Traffic Classification, E-Voting, Computer Science, Physical Sciences, Cryptography, FOS: Languages and literature, Internet privacy, Voting, Law, Finance
-
9Academic Journal
Authors: Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
Source: Proceedings on Privacy Enhancing Technologies. 2024:430-446
Subject Terms: Economics, Markov chain, Macroeconomics, Encryption, 02 engineering and technology, Leverage (statistics), Searchable Encryption, Theoretical computer science, Artificial Intelligence, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Attribute-Based Encryption, Data mining, Secure Computation, Advanced Cryptographic Schemes and Protocols, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Computer science, Information leakage, Leakage (economics), Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Hash function, Cryptography, Encrypted Traffic, Homomorphic Encryption
-
10Academic Journal
Source: Journal of Psychology and Political Science. :1-9
Subject Terms: FOS: Computer and information sciences, Metric (unit), Identifier, FOS: Political science, FOS: Law, Ballot, Database, Engineering, Artificial Intelligence, Computer security, FOS: Mathematics, Political science, Computer network, Politics, Unit (ring theory), Polling, 16. Peace & justice, Computer science, Mathematics education, Operations management, Machine Learning for Internet Traffic Classification, E-Voting, Computer Science, Physical Sciences, Voting, Data Mining in Various Applications, Law, Mathematics, Information Systems
-
11Academic Journal
Authors: Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, Muhammad Adil, Prabhat Kumar, A.K.M. Najmul Islam
Source: Future Generation Computer Systems. 160:577-597
Linked Full TextSubject Terms: Computer network, Computer Networks and Communications, Physics, Internet of Things, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Computer science, Quantum mechanics, 7. Clean energy, Quantum, IoT Devices, Cooperative Diversity in Wireless Networks, Artificial Intelligence, Machine Learning for Internet Traffic Classification, Computer security, Computer Science, Physical Sciences, Wireless, Telecommunications, Federated Learning, Wireless network, Secure Computation
-
12Academic Journal
Authors: Ke Wang, Jianbo Gao, Q. Edward Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen
Source: Annual Computer Security Applications Conference. :216-228
Subject Terms: Sociology and Political Science, Information privacy, FOS: Political science, Social Sciences, FOS: Law, Artificial Intelligence, Computer security, Trust and Reputation Systems in Online Environments, Access control, Accountability, Political science, Biology, Identity-Based Encryption, Ecology, Advanced Cryptographic Schemes and Protocols, 9. Industry and infrastructure, Physics, Access Control, 1. No poverty, Resistance (ecology), Acoustics, 16. Peace & justice, Computer science, Overhead (engineering), Identity (music), Operating system, Machine Learning for Internet Traffic Classification, FOS: Biological sciences, Computer Science, Physical Sciences, Identity management, Internet privacy, Anonymity, Law
-
13Academic Journal
Passion-Net: a robust precise and explainable predictor for hate speech detection in Roman Urdu text
Authors: Faiza Mehmood, Hina Ghafoor, Muhammad Nabeel Asim, Muhammad Usman Ghani Khan, Waqar Mahmood, Sheraz Ahmed
Source: Neural Computing and Applications. 36:3077-3100
Linked Full TextSubject Terms: FOS: Computer and information sciences, Artificial intelligence, Offensive Language, 02 engineering and technology, Speech recognition, Detection and Prevention of Phishing Attacks, Sentiment analysis, Computational Science and Engineering, Artificial Intelligence, F1 score, Machine learning, Automated Detection of Hate Speech and Offensive Language, 0202 electrical engineering, electronic engineering, information engineering, 10. No inequality, Natural Language Processing, Geography, Natural language processing, 4. Education, Discriminative model, Linguistics, German, Computer science, Urdu, FOS: Philosophy, ethics and religion, Detection, Philosophy, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Bot Detection, FOS: Languages and literature, Benchmark (surveying), Classifier (UML), Geodesy, Information Systems
-
14Academic Journal
Source: Journal of Engineering, Vol 29, Iss 11 (2023)
Subject Terms: FOS: Computer and information sciences, Economics, FOS: Political science, Smart contract, Social Sciences, FOS: Mechanical engineering, Engineering, Evolution and Impact of E-Government Initiatives, Computer security, Architecture, 11. Sustainability, Government (linguistics), Business, Political science, Corporate governance, Politics, Blockchain and Internet of Things Integration, Engineering (General). Civil engineering (General), 16. Peace & justice, Mechanical engineering, Management, FOS: Philosophy, ethics and religion, E-voting, Machine Learning for Internet Traffic Classification, Physical Sciences, TA1-2040, Peer to Peer, Art, Information Systems, Certification, FOS: Law, E-government, Visual arts, Transparency (behavior), Blockchain, Artificial Intelligence, Work (physics), Bureaucracy, BVC, Linguistics, Computer science, Philosophy, Computer Science, Political Science and International Relations, Security, FOS: Languages and literature, E-Government, Law, FOS: Civil engineering, Finance
-
15Academic Journal
Authors: Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, Prabhat Kumar, Alireza Jolfaei, Muhammad Tahir
Contributors: Lappeenrannan-Lahden teknillinen yliopisto LUT, Lappeenranta-Lahti University of Technology LUT, fi=School of Engineering Science|en=School of Engineering Science
Source: IEEE Transactions on Consumer Electronics. 69:906-913
Subject Terms: Cyber-Attacks, Computer Networks and Communications, Internet of Things, Control reconfiguration, Consumer Electronics, Security in SDN, IoT Devices, Engineering, Artificial Intelligence, Computer security, Cloud computing, Embedded system, SDN Controllers, Intrusion Detection System, Computer network, Intrusion detection system, Home automation, Network architecture, Software-Defined Networking and Network Virtualization, Deep learning, Computer science, Software-Defined Networking, Distributed computing, Intrusion Detection, Operating system, Machine Learning for Internet Traffic Classification, Electrical engineering, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Electronics
File Description: fulltext
Linked Full TextAccess URL: https://lutpub.lut.fi/handle/10024/165659
-
16Academic Journal
Authors: Muhammad Adnan, Muhammad Osama Imam, Mobin Javed, Iqbal Murtza
Source: International Journal of Information Security. 23:505-517
Subject Terms: FOS: Computer and information sciences, Review Spam, Artificial neural network, Artificial intelligence, Support vector machine, Computer Networks and Communications, Overfitting, 02 engineering and technology, Boosting (machine learning), Pattern recognition (psychology), Detection and Prevention of Phishing Attacks, Nuclear magnetic resonance, Artificial Intelligence, Ensemble learning, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Decision tree, Data mining, Precision and recall, Naive Bayes classifier, Physics, AdaBoost, Statistical classification, Computer science, Intrusion Detection, Spam Detection, Stacking, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Bot Detection, Network Intrusion Detection and Defense Mechanisms, Botnet Detection, Classifier (UML), Information Systems, Random forest
Linked Full TextAccess URL: https://hdl.handle.net/10037/31848
-
17Academic Journal
Source: Applied Computational Intelligence and Soft Computing, Vol 2023 (2023)
Subject Terms: FOS: Computer and information sciences, Review Spam, Artificial intelligence, Support vector machine, Computer Networks and Communications, 02 engineering and technology, Phishing, Malware, Detection and Prevention of Phishing Attacks, Artificial Intelligence, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Phone, Short Message Service, Linguistics, QA75.5-76.95, Computer science, FOS: Philosophy, ethics and religion, World Wide Web, Operating system, Philosophy, Spam Detection, Machine Learning for Internet Traffic Classification, Electronic computers. Computer science, Computer Science, Physical Sciences, Bot Detection, Network Intrusion Detection and Defense Mechanisms, FOS: Languages and literature, Botnet Detection, Classifier (UML), Software, The Internet, Information Systems
Linked Full TextFile Description: text/xhtml
-
18Academic Journal
Authors: Toan-Thinh Truong, Minh–Triet Tran, Anh-Duc Duong
Source: Peer-to-Peer Networking and Applications. 17:3025-3048
Subject Terms: FOS: Computer and information sciences, Database transaction, Mutual authentication, Authentication, Digital Image Watermarking Techniques, User Authentication Methods and Security Measures, Internet of Things, Computer science, Mathematical analysis, 7. Clean energy, Programming language, IoT Devices, Image Authentication, Machine Learning for Internet Traffic Classification, Artificial Intelligence, Computer security, Authentication (law), Computer Science, Physical Sciences, Cryptography, FOS: Mathematics, Computer Vision and Pattern Recognition, Mathematics, Information Systems, Scheme (mathematics)
-
19Academic Journal
Source: Big Data Mining and Analytics, Vol 6, Iss 3, Pp 311-320 (2023)
Subject Terms: features engineering, Artificial intelligence, Computer Networks and Communications, Characterization and Detection of Android Malware, Artificial Intelligence, Machine learning, Cloud computing, Data mining, Intrusion detection system, QA75.5-76.95, 16. Peace & justice, Computer science, cloud security, anomaly detection, Intrusion Detection, Detection, Operating system, Machine Learning for Internet Traffic Classification, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Anomaly Detection, Classifier (UML), random forest, Random forest
-
20Academic Journal
Authors: Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, Anila Usman, Syed Muhammad Mohsin, Hana Mujlid, Carsten Maple
Source: International Journal of Information Security. 22:1781-1798
Linked Full TextSubject Terms: Artificial intelligence, Computer Networks and Communications, Network simulation, 02 engineering and technology, Anomaly detection, 7. Clean energy, Characterization and Detection of Android Malware, Intranet, Artificial Intelligence, Computer security, Ensemble learning, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Data mining, Computer network, Network topology, Intrusion detection system, Network security, Computer science, Intrusion Detection, 3. Good health, Network Security, Detection, Operating system, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Anomaly Detection, Botnet Detection, The Internet