This project aims to propose a cybercrime detection and prevention model by using support vector machine to reduce the damage due to running of malicious code. A cybercrime detection and prevention model uses support vector machines to create a new prevention model,which can run in Weka software to analyze and classify malicious data. The performance of this model will be evaluated by a social network dataset,which includes benign executable and viruses
Increase in Internet use and facilitating access to social media platform has help the predatory to ...
In this thesis I presented machine learning application for cyber security. In particular anomalies...
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one o...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Abstract—Malware is coined as an instance of malicious code that has the potential to harm a compute...
The existing well-known network based intrusion detection/ prevention techniques such as the misuse ...
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a ...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
In the ever-evolving field of cybersecurity, sophisticated methods—which combine supervised and unsu...
Phishing is an act to get someone's important information in the form of usernames, passwords, and o...
Abstract—This paper researches the intrusion detection problem of the network defense, pointing at t...
In the computer network world Intrusion detection systems (IDS) are used to identify attacks against...
Security is one of the main requirements of the current computer systems, and recently it gains much...
These days, security threats detection, generally discussed to as intrusion, has befitted actual sig...
In current days there was a lot of abused communication found in social media. A recent survey repor...
Increase in Internet use and facilitating access to social media platform has help the predatory to ...
In this thesis I presented machine learning application for cyber security. In particular anomalies...
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one o...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Abstract—Malware is coined as an instance of malicious code that has the potential to harm a compute...
The existing well-known network based intrusion detection/ prevention techniques such as the misuse ...
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a ...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
In the ever-evolving field of cybersecurity, sophisticated methods—which combine supervised and unsu...
Phishing is an act to get someone's important information in the form of usernames, passwords, and o...
Abstract—This paper researches the intrusion detection problem of the network defense, pointing at t...
In the computer network world Intrusion detection systems (IDS) are used to identify attacks against...
Security is one of the main requirements of the current computer systems, and recently it gains much...
These days, security threats detection, generally discussed to as intrusion, has befitted actual sig...
In current days there was a lot of abused communication found in social media. A recent survey repor...
Increase in Internet use and facilitating access to social media platform has help the predatory to ...
In this thesis I presented machine learning application for cyber security. In particular anomalies...
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one o...