[PDF][PDF] Website phishing detection using machine learning techniques

R Alazaidah, A Al-Shaikh… - Journal of …, 2024 - digitalcommons.aaru.edu.jo
Phishing is a cybercrime that is constantly increasing in the recent years due to the
increased use of the Internet and its applications. It is one of the most common types of …

Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing

AM Eid, B Soudan, AB Nassif, MN Injadat - Neural Computing and …, 2024 - Springer
This study investigates the effectiveness of six prominent machine learning models—
random forest, decision trees, K-nearest neighbor, logistic regression, support vector …

[HTML][HTML] A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection

A Moubayed - Future Internet, 2024 - mdpi.com
The rise of 5G networks is driven by increasing deployments of IoT devices and expanding
mobile and fixed broadband subscriptions. Concurrently, the deployment of 5G networks …

A scalable RF-XGBoost framework for financial fraud mitigation

IK Nti, AR Somanathan - IEEE Transactions on Computational …, 2022 - ieeexplore.ieee.org
Machine learning offers the ability to analyze large financial data and extract hidden
knowledge for anomalous patterns. In the current study, we propose an ensemble machine …

Enhancing intrusion detection in IIoT: optimized CNN model with multi-class SMOTE balancing

AM Eid, B Soudan, AB Nassif, MN Injadat - Neural Computing and …, 2024 - Springer
This work introduces an intrusion detection system (IDS) tailored for industrial internet of
things (IIoT) environments based on an optimized convolutional neural network (CNN) …

Autoencoder for Epileptic Seizure Recognition: An Unsupervised Approach

H Nawaz, IU Din, A Almogren… - … on Innovations in …, 2023 - ieeexplore.ieee.org
Anomaly detection in electroencephalogram (EEG) seizure recognition is crucial for timely
and effective patient intervention. Traditional machine learning techniques often depend on …

[HTML][HTML] Controlling user access with scripting to mitigate cyber-attacks

O Nyarko-Boateng, IK Nti, AA Mensah, EK Gyamfi - Scientific African, 2024 - Elsevier
With the growing threats in the dynamic digital landscape, organizations are grappling with
the difficult task of managing cyber-attacks by restricting user accessibility to most …

Comparing Boosting-Based and GAN-Based Models for Intrusion Detection in 5G Networks

A Moubayed - 2024 International Symposium on Networks …, 2024 - ieeexplore.ieee.org
The rise of 5G networks has been driven by the increasing deployment of Internet of Things
(IoT) devices and the expansion of mobile and fixed broadband subscriptions. This has …

Optimized Ensemble Model Towards Secured Industrial IoT Devices

MN Injadat - 2023 24th International Arab Conference on …, 2023 - ieeexplore.ieee.org
The continued growth in the deployment of Internet-of-Things (IoT) devices has been fueled
by the increased connectivity demand, particularly in industrial environments. However, this …

Enhancing the Performance of Sign Language Recognition Models Using Machine Learning

S Al-Daja, MN Injadat, A Moubayed… - … 24th International Arab …, 2023 - ieeexplore.ieee.org
Sign language recognition and related applications heavily rely on image processing.
Interpreting and comprehending sign language gestures used by the deaf and hard of …