A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Prediction of land suitability for crop cultivation based on soil and environmental characteristics using modified recursive feature elimination technique with various …

G Mariammal, A Suruliandi, SP Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Crop cultivation prediction is an integral part of agriculture and is primarily based on factors
such as soil, environmental features like rainfall and temperature, and the quantum of …

Z-CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree

M Sharma - 2014 International Conference on Data Mining and …, 2014 - ieeexplore.ieee.org
Data mining is the extraction of knowledge from large databases. One of the popular data
mining techniques is Classification in which different objects are classified into different …

Modeling suspicious email detection using enhanced feature selection

S Nizamani, N Memon, UK Wiil… - arXiv preprint arXiv …, 2013 - arxiv.org
The paper presents a suspicious email detection model which incorporates enhanced
feature selection. In the paper we proposed the use of feature selection strategies along with …

Feature selection for wheat yield prediction

G Ruß, R Kruse - Research and development in intelligent systems XXVI …, 2009 - Springer
Carrying out effective and sustainable agriculture has become an important issue in recent
years. Agricultural production has to keep up with an everincreasing population by taking …

An intelligent data pre-processing of complex datasets

S Abdul-Rahman, AA Bakar… - Intelligent Data …, 2012 - content.iospress.com
Pre-processing plays a vital role in classification tasks, particularly when complex features
are involved, and this demands a highly intelligent method. In bioinformatics, where datasets …

Feature selection and similarity coefficient based method for email spam filtering

AAA Abdelrahim, AAE Elhadi, H Ibrahim… - 2013 …, 2013 - ieeexplore.ieee.org
Many threats in the real world can be related to activities of persons on the Internet. Spam is
one of the most pressing security problems online. Spam filters try to identify likely spam …

A class-specific ensemble feature selection approach for classification problems

C Soares, P Williams, JE Gilbert, G Dozier - Proceedings of the 48th …, 2010 - dl.acm.org
Due to substantial increases in data acquisition and storage, data pre-processing
techniques such as feature selection have become increasingly popular in classification …

[PDF][PDF] Secure Message Transfer using Triple DES

S Garg, T Garg, B Mallick - International Journal of Computer …, 2017 - academia.edu
With the rapid growing of internet and networks applications, data security becomes more
important than ever before. Encryption algorithms play a crucial role in information security …

Optimal feature selection using mutual information for speech recognition at low SNR

EA Al-Mashabi - 2011 - search.proquest.com
This thesis proposes a new approach for feature selection in speech recognition at low
Signal to Noise Ratio (SNR). This concept is based on a two dimensional optimization of …