Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Deep Learning Network Intrusion Detection Based on MI-XGBoost Feature Selection

    Manzheng Yuan1,2, Kai Yang2,*

    Journal of Cyber Security, Vol.7, pp. 197-219, 2025, DOI:10.32604/jcs.2025.066089 - 07 July 2025

    Abstract Currently, network intrusion detection systems (NIDS) face significant challenges in feature redundancy and high computational complexity, which hinder the improvement of detection performance and significantly reduce operational efficiency. To address these issues, this paper proposes an innovative weighted feature selection method combining mutual information and Extreme Gradient Boosting (XGBoost). This method aims to leverage their strengths to identify crucial feature subsets for intrusion detection accurately. Specifically, it first calculates the mutual information scores between features and target variables to evaluate individual discriminatory capabilities of features and uses XGBoost to obtain feature importance scores reflecting their… More >

  • Open Access

    ARTICLE

    Optimization of Machine Learning Methods for Intrusion Detection in IoT

    Alireza Bahmani*

    Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025

    Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >

  • Open Access

    ARTICLE

    A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks

    Haydar Abdulameer Marhoon1,2,*, Rafid Sagban3,4, Atheer Y. Oudah1,5, Saadaldeen Rashid Ahmed6,7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4181-4218, 2025, DOI:10.32604/cmc.2025.058822 - 06 March 2025

    Abstract In order to address the critical security challenges inherent to Wireless Sensor Networks (WSNs), this paper presents a groundbreaking barrier-based machine learning technique. Vital applications like military operations, healthcare monitoring, and environmental surveillance increasingly deploy WSNs, recognizing the critical importance of effective intrusion detection in protecting sensitive data and maintaining operational integrity. The proposed method innovatively partitions the network into logical segments or virtual barriers, allowing for targeted monitoring and data collection that aligns with specific traffic patterns. This approach not only improves the diversit. There are more types of data in the training set,… More >

  • Open Access

    ARTICLE

    Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection

    Nada Mohammed Murad1, Adnan Yousif Dawod2, Saadaldeen Rashid Ahmed3,4,*, Ravi Sekhar5, Pritesh Shah5

    Intelligent Automation & Soft Computing, Vol.40, pp. 1-27, 2025, DOI:10.32604/iasc.2024.058624 - 10 January 2025

    Abstract This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity, focusing on network intrusion detection systems (NIDS). The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing a more flexible and robust security architecture. We use seven unique machine learning models to improve detection skills, emphasizing data quality, traceability, and transparency, facilitated by a blockchain layer that safeguards against data modification and ensures auditability. Our technique employs the Synthetic Minority Oversampling Technique (SMOTE) to equilibrate the dataset, therefore mitigating prevalent class imbalance difficulties… More >

  • Open Access

    ARTICLE

    IDSSCNN-XgBoost: Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition

    Adnan Ahmad, Zhao Li*, Irfan Tariq, Zhengran He

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 729-749, 2025, DOI:10.32604/cmc.2024.055768 - 03 January 2025

    Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers

    Asma A. Alhashmi1, Abdulbasit A. Darem1,*, Sultan M. Alanazi1, Abdullah M. Alashjaee2, Bader Aldughayfiq3, Fuad A. Ghaleb4,5, Shouki A. Ebad1, Majed A. Alanazi1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3483-3498, 2023, DOI:10.32604/cmc.2023.041038 - 08 October 2023

    Abstract In an era marked by escalating cybersecurity threats, our study addresses the challenge of malware variant detection, a significant concern for a multitude of sectors including petroleum and mining organizations. This paper presents an innovative Application Programmable Interface (API)-based hybrid model designed to enhance the detection performance of malware variants. This model integrates eXtreme Gradient Boosting (XGBoost) and an Artificial Neural Network (ANN) classifier, offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware authors. The model’s design capitalizes on the benefits of both static and dynamic analysis to extract… More >

  • Open Access

    ARTICLE

    Machine-Learning-Enabled Obesity Level Prediction Through Electronic Health Records

    Saeed Ali Alsareii1, Muhammad Awais2,*, Abdulrahman Manaa Alamri1, Mansour Yousef AlAsmari1, Muhammad Irfan3, Mohsin Raza2, Umer Manzoor4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3715-3728, 2023, DOI:10.32604/csse.2023.035687 - 03 April 2023

    Abstract Obesity is a critical health condition that severely affects an individual’s quality of life and well-being. The occurrence of obesity is strongly associated with extreme health conditions, such as cardiac diseases, diabetes, hypertension, and some types of cancer. Therefore, it is vital to avoid obesity and or reverse its occurrence. Incorporating healthy food habits and an active lifestyle can help to prevent obesity. In this regard, artificial intelligence (AI) can play an important role in estimating health conditions and detecting obesity and its types. This study aims to see obesity levels in adults by implementing… More >

  • Open Access

    ARTICLE

    Prediction of Alzheimer’s Using Random Forest with Radiomic Features

    Anuj Singh*, Raman Kumar, Arvind Kumar Tiwari

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 513-530, 2023, DOI:10.32604/csse.2023.029608 - 16 August 2022

    Abstract Alzheimer’s disease is a non-reversible, non-curable, and progressive neurological disorder that induces the shrinkage and death of a specific neuronal population associated with memory formation and retention. It is a frequently occurring mental illness that occurs in about 60%–80% of cases of dementia. It is usually observed between people in the age group of 60 years and above. Depending upon the severity of symptoms the patients can be categorized in Cognitive Normal (CN), Mild Cognitive Impairment (MCI) and Alzheimer’s Disease (AD). Alzheimer’s disease is the last phase of the disease where the brain is severely… More >

  • Open Access

    ARTICLE

    Click through Rate Effectiveness Prediction on Mobile Ads Using Extreme Gradient Boosting

    AlAli Moneera, AlQahtani Maram, AlJuried Azizah, Taghareed AlOnizan, Dalia Alboqaytah, Nida Aslam*, Irfan Ullah Khan

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1681-1696, 2021, DOI:10.32604/cmc.2020.013466 - 26 November 2020

    Abstract Online advertisements have a significant influence over the success or failure of your business. Therefore, it is important to somehow measure the impact of your advertisement before uploading it online, and this is can be done by calculating the Click Through Rate (CTR). Unfortunately, this method is not eco-friendly, since you have to gather the clicks from users then compute the CTR. This is where CTR prediction come in handy. Advertisement CTR prediction relies on the users’ log regarding click information data. Accurate prediction of CTR is a challenging and critical process for e-advertising platforms… More >

Displaying 1-10 on page 1 of 14. Per Page