[PDF][PDF] Islamic moderation in education and the phenomenon of cyberterrorism: a systematic literature review

S Ma'arif, H Ibda, F Ahmadi, N Qosim… - Indonesian Journal of …, 2023 - academia.edu
This article presents a systematic literature review on Islamic moderation in education to
prevent cyberterrorism in the latest literature. The method used is the systematic literature …

Malware detection using deep learning and correlation-based feature selection

ES Alomari, RR Nuiaa, ZAA Alyasseri, HJ Mohammed… - Symmetry, 2023 - mdpi.com
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across
the network. Malware traffic is always asymmetrical compared to benign traffic, which is …

A large scale group decision making system based on sentiment analysis cluster

JR Trillo, E Herrera-Viedma, JA Morente-Molinera… - Information …, 2023 - Elsevier
Nowadays, group decision making is an everyday occurrence in different scenarios, such as
marketing or social networks. These social networks have facilitated communication …

[HTML][HTML] An innovative decision making method for air quality monitoring based on big data-assisted artificial intelligence technique

L Fu, J Li, Y Chen - Journal of Innovation & Knowledge, 2023 - Elsevier
This work dissects the application of big data and artificial intelligence (AI) technology in
environmental protection monitoring. The application principle of big data in environmental …

An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system

Z Ling, ZJ Hao - International Journal on Semantic Web and …, 2022 - igi-global.com
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection
accuracy especially for small samples sets. This paper presents a detection model based on …

[HTML][HTML] A Bayesian probability model for Android malware detection

SRT Mat, MF Ab Razak, MNM Kahar, JM Arif, A Firdaus - ICT Express, 2022 - Elsevier
The unprecedented growth of mobile technology has generated an increase in malware and
raised concerns over malware threats. Different approaches have been adopted to …

A content and URL analysis‐based efficient approach to detect smishing SMS in intelligent systems

AK Jain, BB Gupta, K Kaur, P Bhutani… - … Journal of Intelligent …, 2022 - Wiley Online Library
Smishing is a combined form of short message service (SMS) and phishing in which a
malicious text message or SMS is sent to mobile users. This form of attack has come to be a …

[PDF][PDF] Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review

VDH De Carvalho, A Costa - Socioecon. Anal, 2023 - periodicos.ufpe.br
Text mining and related analytics emerge as a technological approach to support human
activities in extracting useful knowledge through texts in several formats. From a managerial …

Extended-range prediction model using NSGA-III optimized RNN-GRU-LSTM for driver stress and drowsiness

KT Chui, BB Gupta, RW Liu, X Zhang, P Vasant… - Sensors, 2021 - mdpi.com
Road traffic accidents have been listed in the top 10 global causes of death for many
decades. Traditional measures such as education and legislation have contributed to limited …

An NLP‐Based Framework to Spot Extremist Networks in Social Media

A Zapata Rozo, D Díaz-López, J Pastor-Galindo… - …, 2024 - Wiley Online Library
Governments and law enforcement agencies (LEAs) are increasingly concerned about
growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism …