Picture for MohammadNoor Injadat

MohammadNoor Injadat

Optimized Ensemble Model Towards Secured Industrial IoT Devices

Add code
Jan 10, 2024
Viaarxiv icon

Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities

Add code
Jan 11, 2021
Figure 1 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 2 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 3 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 4 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Viaarxiv icon

Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

Add code
Dec 25, 2020
Figure 1 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Figure 2 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Viaarxiv icon

DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

Add code
Dec 25, 2020
Figure 1 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 2 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 3 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 4 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Viaarxiv icon

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Add code
Dec 16, 2020
Figure 1 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 2 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 3 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Viaarxiv icon

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Add code
Dec 16, 2020
Figure 1 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 2 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 3 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 4 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Viaarxiv icon

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Add code
Aug 09, 2020
Figure 1 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 2 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 3 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 4 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Viaarxiv icon

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Add code
Aug 05, 2020
Figure 1 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 2 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 3 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 4 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Viaarxiv icon

Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining

Add code
Jun 09, 2020
Figure 1 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 2 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 3 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 4 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Viaarxiv icon

Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review

Add code
May 23, 2020
Figure 1 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 2 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 3 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 4 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Viaarxiv icon