Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods

A Amin, B Shah, AM Khattak, FJL Moreira, G Ali… - International Journal of …, 2019 - Elsevier
Abstract Cross-Company Churn Prediction (CCCP) is a domain of research where one
company (target) is lacking enough data and can use data from another company (source) …

Clustering categorical data: A survey

S Naouali, S Ben Salem, Z Chtourou - International Journal of …, 2020 - World Scientific
Clustering is a complex unsupervised method used to group most similar observations of a
given dataset within the same cluster. To guarantee high efficiency, the clustering process …

Machine learning with digital forensics for attack classification in cloud network environment

S Sachdeva, A Ali - … Journal of System Assurance Engineering and …, 2022 - Springer
In this paper, various Distributed Denial of service attacks like Internet Control Message
Protocol Attack, Transmission Control Protocol Sync Attack, and User Datagram Protocol …

Deep learning for customer churn prediction in e-commerce decision support

M Pondel, M Wuczyński, W Gryncewicz, Ł Łysik… - Business Information …, 2021 - tib-op.org
Churn prediction is a Big Data domain, one of the most demanding use cases of recent time.
It is also one of the most critical indicators of a healthy and growing business, irrespective of …

Just-in-time customer churn prediction in the telecommunication sector

A Amin, F Al-Obeidat, B Shah, MA Tae, C Khan… - The Journal of …, 2020 - Springer
Due to the exponential growth in technologies and a greater number of competitors in the
telecom sector, the companies are facing a rigorous problem of customer churns. The …

Taxonomy of security attacks and risk assessment of cloud computing

M Swathy Akshaya, G Padmavathi - Advances in Big Data and Cloud …, 2019 - Springer
Cloud Computing is an international collection of hardware and software from thousands of
computer network. It permits digital information to be shared and distributed at very less cost …

DDoS attack detection in Edge-IIoT using ensemble learning

F Laiq, F Al-Obeidat, A Amin… - 2023 7th Cyber Security …, 2023 - ieeexplore.ieee.org
Every Edge-IIoT device and network is susceptible to attacks because they are connected to
the internet. The number of IoT devices grows daily due to the rapid advancement in …

Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert

S Anwar, F Al-Obeidat, A Tubaishat… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
This article proposes a novel methodology to detect malicious uniform resource locators
(URLs) using simulated expert (SE) and knowledge-base system (KBS). The proposed study …

Cyber attack prediction using social data analysis

B Munkhdorj, S Yuji - Journal of High Speed Networks, 2017 - journals.sagepub.com
The most common methods used in cyber attack detection are signature scan and anomaly
detection. In the case of applying these approaches, a countermeasure against an …

Rough set theory in the classification of loan applications

J Becker, A Radomska-Zalas, P Ziemba - Procedia Computer Science, 2020 - Elsevier
The article presents the results of the study, which is a fragment of the work carried out under
the project entitled “Hybrid system for intelligent diagnostics of prognostic models”, co …