[HTML][HTML] Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

M Mazini, B Shirazi, I Mahdavi - Journal of King Saud University-Computer …, 2019 - Elsevier
Intrusion detection systems (IDSs) has been considered as the main component of a safe
network. One of the problems of these security systems is false alarm report of intrusion to …

Spam emails in academia: issues and costs

JA Teixeira da Silva, A Al-Khatib, P Tsigaris - Scientometrics, 2020 - Springer
Academic research output is increasing at a very fast growth rate per year. Given this
expansion, new publishers will enter the market or existing publishers will introduce new …

5Ws model for big data analysis and visualization

J Zhang, ML Huang - 2013 IEEE 16th International Conference …, 2013 - ieeexplore.ieee.org
Big Data, which contains image, video, text, audio and other forms of data, collected from
multiple datasets, is difficult to process using traditional database management tools or …

Detect and correlate information system events through verbose logging messages analysis

F Amato, G Cozzolino, A Mazzeo, F Moscato - Computing, 2019 - Springer
Detecting and tracking events from logging data is a critical element for security and system
administrators and thus attracts more and more research efforts. However, there exists a …

Big data density analytics using parallel coordinate visualization

J Zhang, ML Huang, WB Wang, LF Lu… - 2014 IEEE 17th …, 2014 - ieeexplore.ieee.org
Parallel coordinate is a popular tool for visualizing high-dimensional data and analyzing
multivariate data. With the rapid growth of data size and complexity, data clutter in parallel …

Density approach: a new model for BigData analysis and visualization

J Zhang, ML Huang - Concurrency and Computation: Practice …, 2016 - Wiley Online Library
In this paper, we extended our density model to BigData analysis and visualization. BigData,
which contains images, videos, texts, audio files and other forms of data collected from …

WAF‐based chinese character recognition for spam image filtering

S LI, R LI, Y XU, H ZHOU, H YAN, B XU… - Chinese Journal of …, 2018 - Wiley Online Library
We address the problem of filtering image spam, a kind of rapidly spread spam in which the
text is embedded into images to defeat text‐based spam filter. Particularly, we focus on …

Improving blog spam filters via machine learning

W Yang, L Kwok - … Journal of Data Analysis Techniques and …, 2017 - inderscienceonline.com
As an important platform of electronic commerce, blogs can greatly influence internet users'
purchasing decisions. Spam, however, can substantially reduce blogs' positive impact on …

A learning-based framework for supervised and unsupervised image segmentation evaluation

J Lin, B Peng, T Li - International Journal of Image and Graphics, 2014 - World Scientific
Image segmentation is a fundamental task in automatic image analysis. However, there is
still no generally accepted effectiveness measure which is suitable for evaluating the …

Visual analytics for BigData variety and its behaviours

J Zhang, ML Huang, ZP Meng - Computer Science and Information …, 2015 - doiserbia.nb.rs
BigData, defined as structured and unstructured data containing images, videos, texts, audio
and other forms of data collected from multiple datasets, is too big, too complex and moves …