Search alternatives:
source » sources (Expand Search), resource (Expand Search)
decrease » increase (Expand Search)
datasets » dataset (Expand Search)
source » sources (Expand Search), resource (Expand Search)
decrease » increase (Expand Search)
datasets » dataset (Expand Search)
-
1
-
2
-
3
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …”
-
4
Novel interpretable and robust web-based AI platform for phishing email detection
Published 2024“…<p dir="ltr">Phishing emails continue to pose a significant threat, causing financial losses and security breaches. …”
-
5
The distribution of toxic sources in Louisiana
Published 1993“…The results reveal that income levels in communities that host toxic sources are consistently and significantly lower than the state averages. …”
Get full text
Get full text
Get full text
masterThesis -
6
Ensemble deep learning for brain tumor detection
Published 2022“…We experiment on an MRI brain image dataset. First, the data is preprocessed efficiently, and then, the Convolutional Neural Network (CNN) is applied to extract the significant features from images. …”
-
7
Creating and detecting fake reviews of online products
Published 2022“…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …”
-
8
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…The dialect for each comment was also added. This gives the dataset an advantage since it can be used for other purposes such as sentiment analysis and dialect identification, not just for cyberbullying detection. …”
Get full text
-
9
A Neighborhood Framework for Resource-Lean Content Flagging
Published 2022“…Our evaluation results on eight languages from two different datasets for abusive language detection show sizable improvements of up to 9.5 F1 points absolute (for Italian) over strong baselines. …”
-
10
-
11
Renewable Energy, Coal as a Baseload Power Source, and Greenhouse Gas Emissions: Evidence from U.S. State-Level Data
Published 2017“…After accounting for the role of coal as a baseload power source, an increase in the share of renewable energy is estimated to mitigate N2O emissions at the U.S. state level only if states individually decrease their share of coal use to levels below 41.47%. …”
Get full text
article -
12
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social datasets. …”
Get full text
-
13
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social datasets. …”
Get full text
Get full text
-
14
Explainable phishing website detection for secure and sustainable cyber infrastructure
Published 2025“…Moreover, previous research has often overlooked the critical role of identifying which features are important for detection and their impact on outcomes. Traditional methods might not fully capture the significance of individual features. …”
-
15
-
16
Cyber-Resilient Detection of Power Quality Events with NSCT and PCA-SVM
Published 2025“…Comprehensive experiments conducted on synthetic and real-world datasets validate the framework’s effectiveness, demonstrating superior detection accuracy, robustness to noise, and resilience against cyber-attacks. …”
-
17
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Published 2024“…The novelty of this research lies in providing a roadmap for researchers, practitioners, and cybersecurity experts to navigate the landscape of machine learning (ML) and deep learning (DL) models for phishing detection. The study reviews traditional phishing detection methods, ML and DL models, phishing datasets, and the step-by-step phishing process. …”
-
18
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published 2023“…In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. …”
-
19
Network Packet Transformation Approaches for Intrusion Detection Systems: A Survey
Published 2025“…Using insights from the literature and additional experiments conducted on the CICIDS-2017 dataset, we assessed each representation not only in terms of its ability to enhance detection performance but also in terms of computational efficiency. …”
-
20
Classification and segmentation of kidney MRI images for chronic kidney disease detection
Published 2024“…<p>Chronic Kidney Disease (CKD) is a common ailment with significant public health implications, underscoring the critical importance of early detection and diagnosis for effective management. …”