Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (2)
- <p>Cyberterrorism.</p> <p>Data mining – Statistical methods.</p> <p>Data mining – Implements.</p> <p>Support vector machines.</p> <p>Decision trees.</p> <p>Machine learning.</p> <p>Neural networks (computer science) – Research.</p> (1)
- Community detections (1)
- Cyberattacks (1)
- Cyberterrorism (1)
-
- Dark Web (1)
- Diel vertical migration (1)
- Internet (1)
- Kdd cup 99 dataset (1)
- Landmark configuration analysis (1)
- Momocs (1)
- Natural language processing (1)
- Neural networks (1)
- Outline analysis (1)
- Self-normalizing neural networks (1)
- Shape indicator measurements (1)
- Social networks (1)
- Terrorism (1)
- Topics models (1)
- Trait-based ecology (1)
Articles 1 - 3 of 3
Full-Text Articles in Statistical Methodology
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
All HCAS Student Capstones, Theses, and Dissertations
Trait-based ecology characterizes individuals’ functional attributes to better understand and predict their interactions with other species and their environments. Utilizing morphological traits to describe functional groups has helped group species with similar ecological niches that are not necessarily taxonomically related. Within the deep-pelagic fishes, the Order Stomiiformes exhibits high morphological and species diversity, and many species undertake diel vertical migration (DVM). While the morphology and behavior of stomiiform fishes have been extensively studied and described through taxonomic assessments, the connection between their form and function regarding their DVM types, morphotypes, and daytime depth distributions is not well known. Here, three …
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
Theses, Dissertations and Capstones
Cyberattack is a never-ending war that has greatly threatened secured information systems. The development of automated and intelligent systems provides more computing power to hackers to steal information, destroy data or system resources, and has raised global security issues. Statistical and Data mining tools have received continuous research and improvements. These tools have been adopted to create sophisticated intrusion detection systems that help information systems mitigate and defend against cyberattacks. However, the advancement in technology and accessibility of information makes more identifiable elements that can be used to gain unauthorized access to systems and resources. Data mining and classification tools …
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Graduate Theses, Dissertations, and Problem Reports
This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …