Rumor detection on twitter using features extraction method

HM Jabir, MA Naser… - 2020 1st. Information …, 2020 - ieeexplore.ieee.org
Rumors can widely and rapidly diffuse in social networks than in offline platforms. This work
was an attempt to address this challenge by introducing an approach for rumors detection …

Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner's Rule) for Classification of Keystroke Dynamic Authentication

Z Sari, DR Chandranegara, RN Khasanah… - Jurnal Online …, 2022 - join.if.uinsgd.ac.id
Abstract Keystroke Dynamics Authentication (KDA) is a technique used to recognize
somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing …

Advances in key stroke dynamics-based security schemes

MS Obaidat, P Venkata Krishna, V Saritha… - … -Based Physical and …, 2019 - Springer
Securing access to computer and network systems has become an important issue in recent
days because most of the people stockpile their important information on their cell phones …

Multilevel Cryptography Model using RC5, Twofish, and Modified Serpent Algorithms

MM Hoobi - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
Due to the rapid development of digital communication systems, information security is now
essential for both the storage and exchange of data. Security has become a key research …