Open Access iconOpen Access

ARTICLE

crossmark

Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks

Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Lubna A. Alharbi4, Mohamed K. Nour5, Abdullah Mohamed6, Ahmed S. Almasoud7, Abdelwahed Motwakel2

1 Department of Electrical and Computer Engineering, International Islamic University Malaysia, Kuala Lumpur, 53100, Malaysia
2 Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj, 16278, Saudi Arabia
3 Department of Electrical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P. O. Box 84428, Riyadh, 11671, Saudi Arabia
4 Department of Computer Science, College of Computers and Information Technology, Tabuk University, Tabuk, 47512, Saudi Arabia
5 Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Mecca, 24382, Saudi Arabia
6 Research Centre, Future University in Egypt, New Cairo, 11845, Egypt
7 Department of Information Systems, College of Computer and Information Sciences, Prince Sultan University, Riyadh, 12435, Saudi Arabia

* Corresponding Author: Anwer Mustafa Hilal. Email: email

Computer Systems Science and Engineering 2023, 45(2), 2033-2047. https://doi.org/10.32604/csse.2023.031181

Abstract

Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN. For achieving this, the SHODLCS model involves data pre-processing and TF-IDF based feature extraction. In addition, the cascaded recurrent neural network (CRNN) model is applied for the identification and classification of CB. Finally, the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance. The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches.

Keywords


Cite This Article

A. M. Hilal, A. H. A. Hashim, H. G. Mohamed, L. A. Alharbi, M. K. Nour et al., "Spotted hyena optimizer with deep learning driven cybersecurity for social networks," Computer Systems Science and Engineering, vol. 45, no.2, pp. 2033–2047, 2023. https://doi.org/10.32604/csse.2023.031181



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 904

    View

  • 382

    Download

  • 0

    Like

Share Link