Computational System to Classify Cyber Crime Offenses using Machine Learning
暂无分享,去创建一个
Abdulrahman Al-Ahmari | Thippa Reddy Gadekallu | Rupa Ch | Mustufa Haider Abidi | M. H. Abidi | A. Al-Ahmari | T. Gadekallu | Rupa Ch | Rupa Ch.
[1] S Prabakaran,et al. Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning , 2018 .
[2] M Lakshmi Prasanthi. Cyber Crime: Prevention & Detection , 2015 .
[3] Praveen Kumar Reddy Maddikunta,et al. A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU , 2020, Electronics.
[4] Wazir Zada Khan,et al. A deep neural networks based model for uninterrupted marine environment monitoring , 2020, Comput. Commun..
[5] Amin Keshavarzi,et al. Analysis and Prediction of Crimes by Clustering and Classification , 2015 .
[6] George Tsakalidis,et al. A Systematic Approach Toward Description and Classification of Cybercrime Incidents , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[7] Wazir Zada Khan,et al. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks , 2020, IEEE Access.
[8] Thar Baker,et al. Analysis of Dimensionality Reduction Techniques on Big Data , 2020, IEEE Access.
[9] Gulshan Kumar,et al. Cybercrimes: A Proposed Taxonomy and Challenges , 2018, J. Comput. Networks Commun..
[10] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[11] Tariq Rahim Soomro,et al. Social Media-Related Cybercrimes and Techniques for Their Prevention , 2019, Appl. Comput. Syst..
[12] Ajay Singh,et al. Energy Efficient Fault Tolerable Routing Protocol for Wireless Sensor Networks , 2016 .
[13] Kim-Kwang Raymond Choo,et al. Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.
[14] Debiao He,et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things , 2019, Ann. des Télécommunications.
[15] Thar Baker,et al. Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.
[16] Ahmed J. Aljaaf,et al. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems , 2020, Handbook of Computer Networks and Cyber Security.
[17] Jungkook An,et al. A Data Analytics Approach to the Cybercrime Underground Economy , 2018, IEEE Access.
[18] Shiju Sathyadevan,et al. Crime analysis and prediction using data mining , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[19] Guan Zhu Zhang. Computer Forensics Based on Data Mining , 2014, ICRA 2014.
[20] M. Williams,et al. Crime sensing with big data: the affordances and limitations of using open source communications to estimate crime patterns , 2016 .
[21] Harshita Patel,et al. A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.