[HTML][HTML] Artificial intelligence methodologies for data management

J Serey, L Quezada, M Alfaro, G Fuertes, M Vargas… - Symmetry, 2021 - mdpi.com
This study analyses the main challenges, trends, technological approaches, and artificial
intelligence methods developed by new researchers and professionals in the field of …

Recurrent neural networks with TF-IDF embedding technique for detection and classification in tweets of dengue disease

S Amin, MI Uddin, S Hassan, A Khan, N Nasser… - Ieee …, 2020 - ieeexplore.ieee.org
With the increased usage of Web 2.0 and data-affluent tools such as social media platforms
and web blog services, the challenge of extracting public sentiment and disseminating …

Web-based E-learning in Elementary School: A Systematic Literature Review

HI Purnama, I Wilujeng, CSA Jabar - JOIV: International Journal on …, 2023 - joiv.org
This article presents literature review on web-based e-learning in elementary school in the
latest literature. SLR method and PRISMA protocol with the stages of identification …

[HTML][HTML] Efficient on-the-fly Web bot detection

G Suchacka, A Cabri, S Rovetta, F Masulli - Knowledge-Based Systems, 2021 - Elsevier
A large fraction of traffic on present-day Web servers is generated by bots—intelligent
agents able to traverse the Web and execute various advanced tasks. Since bots' activity …

[HTML][HTML] Identifying legitimate Web users and bots with different traffic profiles—an Information Bottleneck approach

G Suchacka, J Iwański - Knowledge-Based Systems, 2020 - Elsevier
Recent studies reported that about half of Web users nowadays are intelligent agents (Web
bots). Many bots are impersonators operating at a very high sophistication level, trying to …

Bot datasets on twitter: Analysis and challenges

LD Samper-Escalante, O Loyola-González, R Monroy… - Applied Sciences, 2021 - mdpi.com
The reach and influence of social networks over modern society and its functioning have
created new challenges and opportunities to prevent the misuse or tampering of such …

Exploring visual representations of computer mouse movements for bot detection using deep learning approaches

H Niu, A Wei, Y Song, Z Cai - Expert Systems with Applications, 2023 - Elsevier
Nowadays, bots can be seen everywhere on the Internet and are responsible for a large
percentage of website traffic. The problem of bot detection has increasingly gained attention …

Blockchain-oriented approach for detecting cyber-attack transactions

Z Feng, Y Li, X Ma - Financial Innovation, 2023 - Springer
With the high-speed development of decentralized applications, account-based blockchain
platforms have become a hotbed of various financial scams and hacks due to their …

[LLIBRE][B] Tyrants on twitter: protecting democracies from information warfare

DL Sloss - 2022 - books.google.com
A look inside the weaponization of social media, and an innovative proposal for protecting
Western democracies from information warfare. When Facebook, Twitter, YouTube, and …

Early web application attack detection using network traffic analysis

B Rajić, Ž Stanisavljević, P Vuletić - International Journal of Information …, 2023 - Springer
The number of deployed web applications and the number of web-based attacks in the last
decade are constantly increasing. One group of tools that gained the attention of cyber …