Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
SMS spam filtering and thread identification using bi-level text classification and clustering techniques
SMS spam detection is an important task where spam SMS messages are identified and
filtered. As greater numbers of SMS messages are communicated every day, it is very …
filtered. As greater numbers of SMS messages are communicated every day, it is very …
[PDF][PDF] Using Machine Learning Techniques for Subjectivity Analysis based on Lexical and Nonlexical Features.
Machine learning techniques have been used to address various problems and
classification of documents is one of the main applications of such techniques. Opinion …
classification of documents is one of the main applications of such techniques. Opinion …
Spam detection in SMS based on feature selection techniques
A Sharaff - Emerging Technologies in Data Mining and Information …, 2019 - Springer
Abstract Short Message Service (SMS) has become the most effective and efficient means of
communication. The popularity for SMS is due to their ease of use. But with the advent of this …
communication. The popularity for SMS is due to their ease of use. But with the advent of this …
[PDF][PDF] A Bi-Level Text Classification Approach for SMS Spam Filtering and Identifying Priority Messages.
NK Nagwani - International Arab Journal of Information Technology …, 2017 - ccis2k.org
Short Message Service (SMS) traffic is increasing day by day and trillions of sms are sent
and received by billions of users every day. Spam messages are also increasing in same …
and received by billions of users every day. Spam messages are also increasing in same …
[PDF][PDF] Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST).
K Periyasamy, S Arirangan - Int. Arab J. Inf. Technol., 2019 - iajit.org
Software applications are the origin to spread vulnerabilities in systems, networks and other
software applications. Vulnerability Discovery Model (VDM) helps to encounter the …
software applications. Vulnerability Discovery Model (VDM) helps to encounter the …
Detecting network security threats using domain name system and NetFlow traffic
With more and more organization in the world rely on the Internet to do their business or
activity, the malicious attackers are always looking for ways to penetrate in organization …
activity, the malicious attackers are always looking for ways to penetrate in organization …
Design of Security Defense Mechanism for Worm Virus Attacks in Power Information Networks
X Li, W Duan, B Wang, W Wei, X Wang… - 2023 IEEE 3rd …, 2023 - ieeexplore.ieee.org
Smart grid is inseparable from digitization, informatization, and intelligence, and it is even
more inseparable from digitization, informatization, and intelligence security. Attacks on the …
more inseparable from digitization, informatization, and intelligence security. Attacks on the …
Enhanced classification of network traffic data captured by intrusion prevention systems
R Aljoufi - 2023 - repository.mdx.ac.uk
A common practice in modern computer networks is the deployment of Intrusion Prevention
Systems (IPSs) for the purpose of identifying security threats. Such systems provide alerts on …
Systems (IPSs) for the purpose of identifying security threats. Such systems provide alerts on …
[PDF][PDF] Detecting scanning computer worms using machine learning and darkspace network traffic
The subject of this paper is computer worm detection in a network. Computers worms have
been defined as a process that can cause a possibly evolved copy of it to execute on a …
been defined as a process that can cause a possibly evolved copy of it to execute on a …