The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning …
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
M Tarafdar, CL Cooper, JF Stich - Information Systems Journal, 2019 - Wiley Online Library
Technostress—defined as stress that individuals experience due to their use of Information Systems—represents an emerging phenomenon of scholarly investigation. It examines how …
The aim of this study is to provide an overview the state-of-the-art elements of text classification. For this purpose, we first select and investigate the primary and recent studies …
Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high severity impacts, many different approaches have been …
Machine learning (ML) has emerged as a formidable force for identifying hidden but pertinent patterns within a given data set with the objective of subsequent generation of …
Composites are widely used to create tunable materials to achieve superior mechanical properties. Brittle materials fail catastrophically in the presence of cracks. Incorporating …
With the incremental use of emails as an essential and popular communication mean over the Internet, there comes a serious threat that impacts the Internet and the society. This …
Recent studies show that neural natural language processing (NLP) models are vulnerable to backdoor attacks. Injected with backdoors, models perform normally on benign examples …