Performance comparison and current challenges of using machine learning techniques in cybersecurity

K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen… - Energies, 2020 - mdpi.com
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …

Data-driven cyber security in perspective—Intelligent traffic analysis

R Coulter, QL Han, L Pan, J Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks.
Traditional approaches resorting to manually defined rules are gradually replaced by …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Cyber threat detection using machine learning techniques: A performance evaluation perspective

K Shaukat, S Luo, S Chen, D Liu - … international conference on …, 2020 - ieeexplore.ieee.org
The present-day world has become all dependent on cyberspace for every aspect of daily
living. The use of cyberspace is rising with each passing day. The world is spending more …

Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y Xiang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …

[HTML][HTML] A pipeline and comparative study of 12 machine learning models for text classification

A Occhipinti, L Rogers, C Angione - Expert systems with applications, 2022 - Elsevier
Text-based communication is highly favoured as a communication mean, especially in
business environments. As a result, it is often abused by sending malicious messages, eg …

A neural network-based ensemble approach for spam detection in Twitter

S Madisetty, MS Desarkar - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the social networking sites get more popular, spammers target these sites to spread
spam posts. Twitter is one of the most popular online social networking sites where users …

Twitter spam detection based on deep learning

T Wu, S Liu, J Zhang, Y Xiang - Proceedings of the australasian …, 2017 - dl.acm.org
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have developed a series of machine learning-based methods and blacklisting …

Semi-supervised spam detection in Twitter stream

S Sedhai, A Sun - IEEE Transactions on Computational Social …, 2017 - ieeexplore.ieee.org
Most existing techniques for spam detection on Twitter aim to identify and block users who
post spam tweets. In this paper, we propose a semi-supervised spam detection (S3D) …

Spammer detection and fake user identification on social networks

F Masood, A Almogren, A Abbas, HA Khattak… - IEEE …, 2019 - ieeexplore.ieee.org
Social networking sites engage millions of users around the world. The users' interactions
with these social sites, such as Twitter and Facebook have a tremendous impact and …