This thesis proposes the use of several supervised machine learning classification models that were built to detect the distribution of malicious content in OSNs. The main focus was on ensemble learning algorithms such as Random Forest, gradient boosting trees, extra trees, and XGBoost. Features were used to identify social network posts that contain malicious URLs derived from several sources, such as domain WHOIS record, web page content, URL lexical and redirection data, and Twitter metadata. The thesis describes a systematic analysis of the hyper-parameters of tree-based models. The impact of key parameters, such as the number of trees, depth of trees and minimum size of leaf nodes on classification performance, was assessed. The res...
Within a given conversation, children appear to think of labels as mutually exclusive. For instance,...
This item is only available electronically.It is widely known that visuospatial attention is critica...
This thesis is a collection of contributions on the technology adoption in Higher Education Institut...
People learn and make decisions by selectively gathering, processing and communicating information –...
Intelligent Tutoring System (ITS) Authoring Tools have successfully been able to mechanise the crea...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
Technology is changing the structure and dynamics of how humans communicate. Channels of communicat...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
The research reported here describes the effects of prior knowledge on how people form categories an...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Within a given conversation, children appear to think of labels as mutually exclusive. For instance,...
This item is only available electronically.It is widely known that visuospatial attention is critica...
This thesis is a collection of contributions on the technology adoption in Higher Education Institut...
People learn and make decisions by selectively gathering, processing and communicating information –...
Intelligent Tutoring System (ITS) Authoring Tools have successfully been able to mechanise the crea...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
Technology is changing the structure and dynamics of how humans communicate. Channels of communicat...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
The research reported here describes the effects of prior knowledge on how people form categories an...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Bayesian networks are becoming an increasingly important area for research and have been proposed fo...
In computer based human object re-identification, a detected human is recognised to a level sufficie...
Within a given conversation, children appear to think of labels as mutually exclusive. For instance,...
This item is only available electronically.It is widely known that visuospatial attention is critica...
This thesis is a collection of contributions on the technology adoption in Higher Education Institut...