4.6 Article

SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

LSTM Based Phishing Detection for Big Email Data

Qi Li et al.

Summary: Phishing emails are becoming more complex, making existing detection methods inadequate. This article introduces an LSTM-based phishing detection method that achieves 95% accuracy through sample expansion and testing stages.

IEEE TRANSACTIONS ON BIG DATA (2022)

Article Computer Science, Hardware & Architecture

SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles

Randhir Kumar et al.

Summary: The current development of UAVs and IoT devices is revolutionizing traditional agriculture into precision agriculture, but also facing challenges in terms of internet security and data privacy. This research proposes the SP2F framework, featuring two main engines - a two-level privacy engine and a deep learning-based anomaly detection engine, which strengthen data authentication and prevent data poisoning attacks by introducing blockchain and smart contracts.

COMPUTER NETWORKS (2021)

Article Computer Science, Theory & Methods

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

Syed Ibrahim Imtiaz et al.

Summary: As the use of Android smartphones becomes more widespread, there is an increasing need for more efficient methods to detect and prevent malicious applications from attacking and compromising user devices.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Theory & Methods

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

Saif ur Rehman et al.

Summary: DDoS attacks can disrupt communication networks, and the DIDDOS approach is effective in preventing new types of DDoS attacks, achieving high accuracy of 99.69% and 99.94% using GRU neural network for classification.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Artificial Intelligence

AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes

Abdul Rehman Javed et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Deep neural networks to predict diabetic retinopathy

Thippa Reddy Gadekallu et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Ensemble sparse representation-based cyber threat hunting for security of smart cities

Seyed Mehdi Hazrati Fard et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Artificial Intelligence

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach

Abbas Yazdinejad et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

Celestine Iwendi et al.

IEEE ACCESS (2020)

Article Computer Science, Cybernetics

A Framework for Automatic Categorization of Social Data Into Medical Domains

Gaurav Sharma et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2020)

Article Chemistry, Multidisciplinary

An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers

Riaz Ullah Khan et al.

APPLIED SCIENCES-BASEL (2019)

Proceedings Paper Computer Science, Theory & Methods

Spam Review Detection Using Deep Learning

G. M. Shahariar et al.

2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON) (2019)

Article Computer Science, Information Systems

A Comprehensive Survey for Intelligent Spam Email Detection

Asif Karim et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

Email Classification Research Trends: Review and Open Issues

Ghulam Mujtaba et al.

IEEE Access (2017)

Article Computer Science, Information Systems

InVEST: Intelligent visual email search and triage

Jay Koven et al.

DIGITAL INVESTIGATION (2016)

Article Computer Science, Artificial Intelligence

Detection of fraudulent emails by employing advanced feature abundance

Sarwat Nizamani et al.

EGYPTIAN INFORMATICS JOURNAL (2014)