Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)

VO Kayhan, M Agrawal, S Shivendu - Decision Support Systems, 2023 - Elsevier
The cyber security industry is rapidly adopting threat hunting as a proactive tool for early and
faster detection of suspected malicious actors. In this paper, we propose a machine learning …

Classification of news texts from different languages with machine learning algorithms

S Ağduk, E Aydemir, A Polat - Journal of Soft Computing and …, 2023 - dergipark.org.tr
As a result of the developments in technology, the internet is accepted as one of the most
important sources of information today. Although it is possible to access a large number of …

Dimensionality reduction for predicting students dropout in MOOC

Z Alj, A Bouayad, MO Cherkaoui Malki - International Conference on …, 2023 - Springer
This paper aims to find a representation of KDD cup 2015 dataset for predicting MOOCs
student dropout in a reduced space, using dimensionality reduction methods …

Intelligent system for text-based diagnostics of deviant states of individual

A Petukhov, A Karandeev… - 2023 7th Scientific …, 2023 - ieeexplore.ieee.org
The article is devoted to the development of the concept of an intelligent system for
diagnosing deviant states of individuals based on text analysis using mainly the following …

Study on local selection pattern of acupuncture points for spastic paralysis of upper limbs after stroke based on medical big data analysis

X Zhang, L Li, H Huang, A Xue - Archives of Clinical Psychiatry, 2023 - archivespsy.com
With the rapid development of medical informatics, a large amount of medical data contains
a wealth of information. The analysis of medical data using medical records, diagnoses …

Dimensionality Reduction for Predicting Students Dropout in MOOC

MM Ouçamah - Advances in Machine Intelligence and Computer …, 2023 - books.google.com
This paper aims to find a representation of an initial dataset for predicting MOOCs student
drop-out in a more reduced space using dimensionality reduction methods. We used two …