Results 31 to 40 of about 1,547,567 (330)
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain Identity feature, Abnormal
Ammar Almomani +6 more
semanticscholar +1 more source
Developments in technology facilitate the use of machine learning methods in medical fields. In cancer research, the combination of machine learning tools and gene expression data has proven its ability to detect cancer patients. However, processing such
Md Faisal Kabir +2 more
doaj +1 more source
Reliable landslide susceptibility mapping (LSM) is essential for disaster prevention and mitigation. This study develops a deep learning framework that integrates spatial response features and machine learning classifiers (SR-ML).
Ruilong Wei +5 more
semanticscholar +1 more source
Comparative Study of Machine Learning Classifiers for Modelling Road Traffic Accidents
Road traffic accidents (RTAs) are a major cause of injuries and fatalities worldwide. In recent years, there has been a growing global interest in analysing RTAs, specifically concerned with analysing and modelling accident data to better understand and ...
Tebogo Bokaba, W. Doorsamy, B. Paul
semanticscholar +1 more source
Heart Disease Risk Prediction Using Machine Learning Classifiers with Attribute Evaluators
Cardiovascular diseases (CVDs) kill about 20.5 million people every year. Early prediction can help people to change their lifestyles and to ensure proper medical treatment if necessary.
K. Reddy +5 more
semanticscholar +1 more source
Environmental Sound Recognition has become a relevant application for smart cities. Such an application, however, demands the use of trained machine learning classifiers in order to categorize a limited set of audio categories. Although classical machine
Lancelot Lhoest +6 more
doaj +1 more source
Longitudinal performance analysis of machine learning based Android malware detectors [PDF]
This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016.
Khan, Sarmadullah, Yerima, Suleiman
core +1 more source
Exploiting `Subjective' Annotations [PDF]
Many interesting phenomena in conversation can only be annotated as a subjective task, requiring interpretative judgements from annotators. This leads to data which is annotated with lower levels of agreement not only due to errors in the annotation, but
Akker, Rieks op den, Reidsma, Dennis
core +2 more sources
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms
Virtual Private Networks (VPNs) are one example of encrypted communication services commonly used to bypass censorship and access geographically locked services.
Ammar Almomani
doaj +1 more source
Machine learning techniques for classifying dangerous asteroids
There is an infinite number of objects in outer space, and these objects and asteroids might be harmful. Hence, it is wise to know what is surrounding us and what can harm us amongst those. Therefore, in this article, with the hyperparameters tuning of Extra Tree, Random Forest, Light Gradient Boosting Machine, Gradient Boosting, and Ada Boost, the ...
Seyed Matin Malakouti +2 more
openaire +3 more sources

