A comprehensive survey on identification and analysis of phishing website based on machine learning methods

MH Alkawaz, SJ Steven… - 2021 IEEE 11th IEEE …, 2021 - ieeexplore.ieee.org
Phishing is a cybercrime which is carried out by imitating a legal website to trick users to
steal their personal data, including usernames, passwords, account numbers, national …

Comparison and detection analysis of network traffic datasets using K-means clustering algorithm

OI Al-Sanjary, MAB Roslan, RAA Helmi… - Journal of Information & …, 2020 - World Scientific
Anomaly detection in specific datasets involves the detection of circumstances that are
common in a homogeneous data. When looking at network traffic data, it is generally difficult …

Developing an intelligent filtering technique for bring your own device network access control

MA Muhammad, A Ayesh, PB Zadeh - proceedings of the international …, 2017 - dl.acm.org
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has
simplified computing by introducing the use of personally owned devices. These devices …

A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework

AI Hajamydeen, NI Udzir - Scalable Computing: Practice and Experience, 2019 - scpe.org
Observing network traffic flow for anomalies is a common method in Intrusion Detection.
More effort has been taken in utilizing the data mining and machine learning algorithms to …

Indoor intrusion detection and filtering system using raspberry Pi

UNA Razimi, MH Alkawaz… - 2020 16th IEEE …, 2020 - ieeexplore.ieee.org
Recently, the current available surveillance technology still lacking in many aspect
especially in terms of price and the flexibility of the alert system. In this modern living styles …

Quick response code validation and phishing detection tool

S Ismail, MH Alkawaz, AE Kumar - 2021 IEEE 11th IEEE …, 2021 - ieeexplore.ieee.org
A Quick Response (QR) Code is a type of barcode that can be read by the digital devices
and which stores the information in a square-shaped. The QR Code readers can extract data …

An intelligent recycling bin using wireless sensor network technology

OI Al-Sanjary, S Vasuthevan, HK Omer… - … on Automatic Control …, 2019 - ieeexplore.ieee.org
Planning the trash container and recycling management for all the rubbish produced in
community service is an enormous task. Waste and recycled items collection or rubbish …

[PDF][PDF] A behaviour profiling based technique for network access control systems

MA Muhammad, A Ayesh - … Journal of Cyber-Security and Digital …, 2019 - researchgate.net
The emergence of the Internet of Things (IoT) has lead to a technological transformation that
integrates several technologies to represent the future of computing and communications …

Beyond Supervision: Exploring Unsupervised Learning Through Clustering

AI Hajamydeen, W Yassin - Recent Trends and Future Direction for …, 2024 - igi-global.com
This chapter investigates the domain of unsupervised learning algorithms, delivering a
detailed outline of its classifications and essential characteristics. Each algorithm is …

Dynamics of Feature Selection in Machine Learning for IR 5.0

AI Hajamydeen, RAA Helmi, MGM Johar… - … , and Education for …, 2024 - igi-global.com
The chapter gives a broad overview to feature selection with an importance on different
selection techniques and algorithms. It utilizes datasets with diverse volume of features and …