An ensemble machine learning approach through effective feature extraction to classify fake news

S Hakak, M Alazab, S Khan, TR Gadekallu… - Future Generation …, 2021 - Elsevier
There are numerous channels available such as social media, blogs, websites, etc., through
which people can easily access the news. It is due to the availability of these platforms that …

Deep learning approach for intelligent intrusion detection system

R Vinayakumar, M Alazab, KP Soman… - Ieee …, 2019 - ieeexplore.ieee.org
Machine learning techniques are being widely used to develop an intrusion detection
system (IDS) for detecting and classifying cyberattacks at the network-level and the host …

FED-IIoT: A robust federated malware detection architecture in industrial IoT

R Taheri, M Shojafar, M Alazab… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The sheer volume of industrial Internet of Things (IIoT) malware is one of the most serious
security threats in today's interconnected world, with new types of advanced persistent …

A review on cyber crimes on the internet of things

MK Kagita, N Thilakarathne, TR Gadekallu… - Deep Learning for …, 2022 - Springer
Abstract Internet of Things (IoT) devices are rapidly becoming universal. The success of IoT
can't be ignored in today's scenario; along with its attacks and threats on IoT devices and …

A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks

P Kumar, GP Gupta, R Tripathi - Journal of ambient intelligence and …, 2021 - Springer
With the development of internet of things (IoT), capabilities of computing, networking
infrastructure, storage of data and management have come very close to the edge of …

Deep graph neural network-based spammer detection under the perspective of heterogeneous cyberspace

Z Guo, L Tang, T Guo, K Yu, M Alazab… - Future generation …, 2021 - Elsevier
Due to the severe threat to cyberspace security, detection of online spammers has been a
universal concern of academia. Nowadays, prevailing literature of this field almost leveraged …

A hybrid deep learning image-based analysis for effective malware detection

S Venkatraman, M Alazab, R Vinayakumar - Journal of Information Security …, 2019 - Elsevier
The explosive growth of Internet and the recent increasing trends in automation using
intelligent applications have provided a veritable playground for malicious software …

Security by design for big data frameworks over cloud computing

FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …

Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set

M Ahmad, Q Riaz, M Zeeshan, H Tahir… - EURASIP Journal on …, 2021 - Springer
Abstract Internet of Things (IoT) devices are well-connected; they generate and consume
data which involves transmission of data back and forth among various devices. Ensuring …

Differentially private data fusion and deep learning framework for cyber–physical–social systems: State-of-the-art and perspectives

NJ Gati, LT Yang, J Feng, X Nie, Z Ren, SK Tarus - Information Fusion, 2021 - Elsevier
The modern technological advancement influences the growth of the cyber–physical system
and cyber–social system to a more advanced computing system cyber–physical–social …