Performance comparison and current challenges of using machine learning techniques in cybersecurity

K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen… - Energies, 2020 - mdpi.com
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …

Machine learning techniques applied to cybersecurity

J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks

D Antonakaki, P Fragopoulou, S Ioannidis - Expert systems with …, 2021 - Elsevier
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …

[LIBRO][B] Hands-on machine learning with R

B Boehmke, BM Greenwell - 2019 - taylorfrancis.com
Hands-on Machine Learning with R provides a practical and applied approach to learning
and develo** intuition into today's most popular machine learning methods. This book …

Misinformation in social media: definition, manipulation, and detection

L Wu, F Morstatter, KM Carley, H Liu - ACM SIGKDD explorations …, 2019 - dl.acm.org
The widespread dissemination of misinformation in social media has recently received a lot
of attention in academia. While the problem of misinformation in social media has been …

Fame for sale: Efficient detection of fake Twitter followers

S Cresci, R Di Pietro, M Petrocchi, A Spognardi… - Decision Support …, 2015 - Elsevier
Fake followers are those Twitter accounts specifically created to inflate the number of
followers of a target account. Fake followers are dangerous for the social platform and …

Enhancing the government accounting information systems using social media information: An application of text mining and machine learning

HK Duan, MA Vasarhelyi, M Codesso… - International Journal of …, 2023 - Elsevier
This study demonstrates a way of bringing an innovative data source, social media
information, to the government accounting information systems to support accountability to …

Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network

MA Al-Garadi, KD Varathan, SD Ravana - Computers in Human Behavior, 2016 - Elsevier
The popularity of online social networks has created massive social communication among
their users and this leads to a huge amount of user-generated communication data. In recent …

Predicting fluctuations in cryptocurrency transactions based on user comments and replies

YB Kim, JG Kim, W Kim, JH Im, TH Kim, SJ Kang… - PloS one, 2016 - journals.plos.org
This paper proposes a method to predict fluctuations in the prices of cryptocurrencies, which
are increasingly used for online transactions worldwide. Little research has been conducted …