Performance comparison and current challenges of using machine learning techniques in cybersecurity
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …
world is becoming more and more dependent on the internet for everyday living. The …
Machine learning techniques applied to cybersecurity
J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …
linearity problems of different topics: prediction, classification, data association, data …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
[LIBRO][B] Hands-on machine learning with R
B Boehmke, BM Greenwell - 2019 - taylorfrancis.com
Hands-on Machine Learning with R provides a practical and applied approach to learning
and develo** intuition into today's most popular machine learning methods. This book …
and develo** intuition into today's most popular machine learning methods. This book …
Misinformation in social media: definition, manipulation, and detection
The widespread dissemination of misinformation in social media has recently received a lot
of attention in academia. While the problem of misinformation in social media has been …
of attention in academia. While the problem of misinformation in social media has been …
Fame for sale: Efficient detection of fake Twitter followers
Fake followers are those Twitter accounts specifically created to inflate the number of
followers of a target account. Fake followers are dangerous for the social platform and …
followers of a target account. Fake followers are dangerous for the social platform and …
Enhancing the government accounting information systems using social media information: An application of text mining and machine learning
This study demonstrates a way of bringing an innovative data source, social media
information, to the government accounting information systems to support accountability to …
information, to the government accounting information systems to support accountability to …
Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network
The popularity of online social networks has created massive social communication among
their users and this leads to a huge amount of user-generated communication data. In recent …
their users and this leads to a huge amount of user-generated communication data. In recent …
Predicting fluctuations in cryptocurrency transactions based on user comments and replies
This paper proposes a method to predict fluctuations in the prices of cryptocurrencies, which
are increasingly used for online transactions worldwide. Little research has been conducted …
are increasingly used for online transactions worldwide. Little research has been conducted …