Accès libre

Research on Feature Extraction Strategies for Cybercrime Crimes Combined with Deep Learning and Their Probabilistic Models

 et   
03 sept. 2024
À propos de cet article

Citez
Télécharger la couverture

Gautam, A. K., & Bansal, A. (2022). Effect of features extraction techniques on cyberstalking detection using machine learning framework. Journal of Advances in Information Technology, 13(5). Search in Google Scholar

Al-Khater, W. A., Al-Maadeed, S., Ahmed, A. A., Sadiq, A. S., & Khan, M. K. (2020). Comprehensive review of cybercrime detection techniques. IEEE access, 8, 137293-137311. Search in Google Scholar

Aljabri, M., Alhaidari, F., Mohammad, R. M. A., Mirza, S., Alhamed, D. H., Altamimi, H. S., & Chrouf, S. M. B. (2022). An Assessment of Lexical, Network, and Content‐Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models. Computational Intelligence and Neuroscience, 2022(1), 3241216. Search in Google Scholar

Goni, I., & Mohammad, M. (2020). Machine learning approach to mobile forensics framework for cyber crime detection in Nigeria. Journal of Computer Science Research, 2(4), 1-6. Search in Google Scholar

Mahor, V., Rawat, R., Telang, S., Garg, B., Mukhopadhyay, D., & Palimkar, P. (2021, September). Machine learning based detection of cyber crime hub analysis using twitter data. In 2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 1-5). IEEE. Search in Google Scholar

Chinedu, P. U., Nwankwo, W., Masajuwa, F. U., & Imoisi, S. (2021). Cybercrime Detection and Prevention Efforts in the Last Decade: An Overview of the Possibilities of Machine Learning Models. Review of International Geographical Education Online, 11(7). Search in Google Scholar

Pandya, D. D., Amarawat, G., Jadeja, A., Degadwala, S., & Vyas, D. (2022, October). Analysis and Prediction of Location based Criminal Behaviors Through Machine Learning. In 2022 International Conference on Edge Computing and Applications (ICECAA) (pp. 1324-1332). IEEE. Search in Google Scholar

Elluri, L., Mandalapu, V., Vyas, P., & Roy, N. (2023). Recent Advancements in Machine Learning for Cybercrime Prediction. Journal of Computer Information Systems, 1-15. Search in Google Scholar

Manyumwa, T., Chapita, P. F., Wu, H., & Ji, S. (2020, December). Towards fighting cybercrime: Malicious url attack type detection using multiclass classification. In 2020 IEEE international conference on big data (Big Data) (pp. 1813-1822). IEEE. Search in Google Scholar

Kumari, S., Saquib, Z., & Pawar, S. (2018, August). Machine learning approach for text classification in cybercrime. In 2018 Fourth international conference on computing communication control and automation (ICCUBEA) (pp. 1-6). IEEE. Search in Google Scholar

Ngejane, C. H., Mabuza-Hocquet, G., Eloff, J. H., & Lefophane, S. (2018, August). Mitigating online sexual grooming cybercrime on social media using machine learning: A desktop survey. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1-6). IEEE. Search in Google Scholar

Ngejane, C. H., Mabuza-Hocquet, G., Eloff, J. H., & Lefophane, S. (2018, August). Mitigating online sexual grooming cybercrime on social media using machine learning: A desktop survey. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1-6). IEEE. Search in Google Scholar

Singh, D., Shukla, A., & Sajwan, M. (2021). Deep transfer learning framework for the identification of malicious activities to combat cyberattack. Future Generation Computer Systems, 125, 687-697. Search in Google Scholar

Awotunde, J. B., & Misra, S. (2022). Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks. In Illumination of artificial intelligence in cybersecurity and forensics (pp. 21-44). Cham: Springer International Publishing. Search in Google Scholar

Akhtar, M. S., & Feng, T. (2022). Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time. Symmetry, 14(11), 2308. Search in Google Scholar

Pakhare, P. S., Krishnan, S., & Charniya, N. N. (2021). A survey on recent advances in cyber assault detection using machine learning and deep learning. Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020, 571-582. Search in Google Scholar

Alshehri, A., Khan, N., Alowayr, A., & Alghamdi, M. Y. (2023). Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics. Computer Systems Science & Engineering, 44(2). Search in Google Scholar

Akhtar, M. S., & Feng, T. (2021). Deep Learning‐Based Framework for the Detection of Cyberattack Using Feature Engineering. Security and Communication Networks, 2021(1), 6129210. Search in Google Scholar

Bilen, A., & Özer, A. B. (2021). Cyber-attack method and perpetrator prediction using machine learning algorithms. PeerJ Computer Science, 7, e475. Search in Google Scholar

Dushyant, K., Muskan, G., Annu, Gupta, A., & Pramanik, S. (2022). Utilizing machine learning and deep learning in cybesecurity: an innovative approach. Cyber security and digital forensics, 271-293. Search in Google Scholar

Aslan, Ö., & Yilmaz, A. A. (2021). A new malware classification framework based on deep learning algorithms. Ieee Access, 9, 87936-87951. Search in Google Scholar

Nicholls, J., Kuppa, A., & Le-Khac, N. A. (2021). Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape. Ieee Access, 9, 163965-163986. Search in Google Scholar

Abbass, Z., Ali, Z., Ali, M., Akbar, B., & Saleem, A. (2020, February). A framework to predict social crime through twitter tweets by using machine learning. In 2020 IEEE 14th International Conference on Semantic Computing (ICSC) (pp. 363-368). IEEE. Search in Google Scholar

Ch, R., Gadekallu, T. R., Abidi, M. H., & Al-Ahmari, A. (2020). Computational system to classify cyber crime offenses using machine learning. Sustainability, 12(10), 4087. Search in Google Scholar

Andleeb, S., Ahmed, R., Ahmed, Z., & Kanwal, M. (2019, December). Identification and classification of cybercrimes using text mining technique. In 2019 International Conference on Frontiers of Information Technology (FIT) (pp. 227-2275). IEEE. Search in Google Scholar

Alsubaei, F. S., Almazroi, A. A., & Ayub, N. (2024). Enhancing phishing detection: A novel hybrid deep learning framework for cybercrime forensics. IEEE Access. Search in Google Scholar

Ning Shao,Qing Chen,Dan Xie,Ye Sun & Chengao Yu.(2024).Improved Temporal Fuzzy Reasoning Spiking Neural P Systems for Power System Fault Diagnosis.Applied Sciences(5), Search in Google Scholar

Luo Minxia,Huang Qianqian & Xu Donghui.(2024).Picture fuzzy reasoning full implication method and its application.Engineering Applications of Artificial Intelligence(PB), Search in Google Scholar

Yihe Lu,Yinyun Yu & Ting Qu.(2023).An ESG Assessment Approach with Multi-Agent Preference Differences: Based on Fuzzy Reasoning and Group Decision-Making.Sustainability(16), Search in Google Scholar

Yao Kai,Li Xinglong & Lu Zhaoxu.(2023).Study on ultrasonic quantitative evaluation technique based on BP neural network and D-S evidence theory..Ultrasonics107235-107235. Search in Google Scholar

Fanyu Du, Lishuai Zhao, Hui Luo, Qijia Xing, Jun Wu, Yuanzhong Zhu... & Jianfang Wu.(2024). Recognition of eye diseases based on deep neural networks for transfer learning and improved D-S evidence theory..BMC medical imaging(1),19-19. Search in Google Scholar