Threats on online social network platforms: classification, detection, and prevention techniques

A Shah, S Varshney, M Mehrotra - Multimedia Tools and Applications, 2024 - Springer
Online social network (OSN) platforms have been incorporated into people's daily lives. A
significant portion of society employs various forms of OSN platforms to disseminate …

Modelling of Reptile Search Algorithm with Deep Learning Approach for Copy Move Image Forgery Detection

M Maashi, H Alamro, H Mohsen, N Negm… - IEEE …, 2023 - ieeexplore.ieee.org
Copy-move (CM) forgery is a common type of image manipulation that involves copying and
pasting a region within an image to conceal or duplicate content. Detection of such forgeries …

[PDF][PDF] Cyberbullying detection on twitter using natural language processing and machine learning techniques

S Afrifa, V Varadarajan - International Journal of Innovative Technology …, 2022 - core.ac.uk
People use social media to engage and debate themes ranging from entertainment to sports
to politics and many others. The use of social media has also resulted in an increase in …

Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system

MA Duhayyim, KA Alissa, FS Alrayes, SS Alotaibi… - Applied Sciences, 2022 - mdpi.com
As cyberattacks develop in volume and complexity, machine learning (ML) was extremely
implemented for managing several cybersecurity attacks and malicious performance. The …

[PDF][PDF] Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection.

FS Alrayes, N Alotaibi, JS Alzahrani… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
The Internet of Things (IoT) is a type of network which enables objects connected by utilizing
communication protocols. Connected objects are in all forms (ie, smart fridges, watches, and …

Optimal deep learning driven intrusion detection in SDN-Enabled IoT environment

M Maray, H Mesfer Alshahrani… - … Materials & Continua, 2022 - wrap.warwick.ac.uk
In recent years, wireless networks are widely used in different domains. This phenomenon
has increased the number of Internet of Things (IoT) devices and their applications. Though …

[PDF][PDF] Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment.

KM Alalayah, FS Alrayes, JS Alzahrani… - Comput. Syst. Sci …, 2023 - academia.edu
With the increased advancements of smart industries, cybersecurity has become a vital
growth factor in the success of industrial transformation. The Industrial Internet of Things …

[PDF][PDF] Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model.

AS Almasoud - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
The Internet of Things (IoT) is considered the next-gen connection network and is ubiquitous
since it is based on the Internet. Intrusion Detection System (IDS) determines the intrusion …

[PDF][PDF] Automated autism spectral disorder classification using optimal machine learning model

HA Mengash, H Alqahtani, M Maray… - CMC Comput. Mater …, 2023 - cdn.techscience.cn
Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-
lasting effects on communication and interaction with others. Advanced information …

[PDF][PDF] Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model.

MM Asiri, HG Mohamed, MK Nour… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Due to exponential increase in smart resource limited devices and high speed
communication technologies, Internet of Things (IoT) have received significant attention in …