Mobile phone data: A survey of techniques, features, and applications

M Okmi, LY Por, TF Ang, CS Ku - Sensors, 2023 - mdpi.com
Due to the rapid growth in the use of smartphones, the digital traces (eg, mobile phone data,
call detail records) left by the use of these devices have been widely employed to assess …

PAREEKSHA: a machine learning approach for intrusion and anomaly detection

A Nagaraja, S Aljawarneh - … of the First International Conference on Data …, 2018 - dl.acm.org
Membership functions help us to identify and know the similarity between two elements such
as vectors or sequences. The objective of this paper is to suggest a membership function …

UTTAMA: an intrusion detection system based on feature clustering and feature transformation

A Nagaraja, B Uma, R Gunupudi - Foundations of Science, 2020 - Springer
Detecting Intrusions and anomalies is becoming much more challenging with new attacks
popping out over a period of time. Achieving better accuracies by applying benchmark …

Performance evaluation of data transmission in a single and double bus network within the utility substation based on IEC 61850

S Kumar, N Das, J Muigai… - 2014 IEEE PES General …, 2014 - ieeexplore.ieee.org
Communication between intelligent electronic devices (IED's) is an important feature of a
utility substation automation system based on IEC 61850. Time critical information related to …

Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models

V Simé, F Tchakounté, BO Yenké, DEH Danga… - Journal of Intelligent …, 2024 - scirp.org
This study examines vishing, a form of social engineering scam using voice communication
to deceive individuals into revealing sensitive information or losing money. With the rise of …

Categorizing Philanthropic CSR Activities Through Hybrid Approach of Fuzzy Clustering and Topic Modeling

NSM Nik Mangsor, SA Md Nasir… - Science and Information …, 2024 - Springer
This research paper presents a new approach for systematically categorizing philanthropic
corporate social responsibility (PCSR) initiatives using document clustering and topic …

Clustering Mixed Data Based on Density Peaks and Stacked Denoising Autoencoders

B Duan, L Han, Z Gou, Y Yang, S Chen - Symmetry, 2019 - mdpi.com
With the universal existence of mixed data with numerical and categorical attributes in real
world, a variety of clustering algorithms have been developed to discover the potential …

Massive-scale visual information retrieval towards city residential environment surveillance

Y Wu, Z Xu - Journal of Visual Communication and Image …, 2020 - Elsevier
Urban residential environment surveillance plays an important role in modern intelligent city.
Satellite images have been applied in various fields, and the analysis and processing of …

A Holistic Neural Networks Classification for Wangiri Fraud Detection in Telecommunications Regulatory Authorities

AA Mawgoud, A Abu-Talleb, BS Tawfik - International Conference on …, 2021 - Springer
Cybercrimes and fraud techniques are major threats to telecommunications sectors in the
last decade, one of those fraud approaches called Wangiri fraud. Wangiri is a common type …

Check for updates

D Anithal, N Kavitha¹, ME Krupa… - … : Proceedings of the …, 2024 - books.google.com
The modern market is full of offers and discounts. Marketers use several promotional
programs to entice customers to buy products and services. While advertising goals are long …