Search Results - "Jantan, Aman"

Refine Results
  1. 1

    State-of-the-art in artificial neural network applications: A survey by Abiodun, Oludare Isaac, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Mohamed, Nachaat AbdElatif, Arshad, Humaira

    Published in Heliyon (01-11-2018)
    “…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
    Get full text
    Journal Article
  2. 2

    Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition by Abiodun, Oludare Isaac, Kiru, Muhammad Ubale, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Umar, Abubakar Malah, Linus, Okafor Uchenwa, Arshad, Humaira, Kazaure, Abdullahi Aminu, Gana, Usman

    Published in IEEE access (2019)
    “…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
    Get full text
    Journal Article
  3. 3

    A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm by Ghanem, Waheed A. H. M., Jantan, Aman

    Published in Neural computing & applications (01-08-2020)
    “…The most pressing issue in network security is the establishment of an approach that is capable of detecting violations in computer systems and networks. There…”
    Get full text
    Journal Article
  4. 4

    Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches by Kazaure, Abdullahi Aminu, Jantan, Aman, Yusoff, Mohd Najwadi

    “…An online social network is a platform that is continuously expanding, which enables groups of people to share their views and communicate with one another…”
    Get full text
    Journal Article
  5. 5

    Multi-Behavior RFM Model Based on Improved SOM Neural Network Algorithm for Customer Segmentation by Liao, Juan, Jantan, Aman, Ruan, Yunfei, Zhou, Changmin

    Published in IEEE access (2022)
    “…Previous research on RFM (recency, frequency, and monetary value) models focused on only one type of user behavior data, i.e., the purchase behavior, without…”
    Get full text
    Journal Article
  6. 6

    Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review by Kazaure, Abdullahi Aminu, Yusoff, Mohd Najwadi, Jantan, Aman

    “…Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp by Abiodun, Esther Omolara, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira

    Published in Wireless personal communications (01-06-2020)
    “…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
    Get full text
    Journal Article
  9. 9

    A MACHINE LEARNING CLASSIFICATION APPROACH TO DETECT TLS-BASED MALWARE USING ENTROPY-BASED FLOW SET FEATURES by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published in Journal of ICT (01-07-2022)
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the…”
    Get full text
    Journal Article
  10. 10

    HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys by Esther Omolara, Abiodun, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira, Dada, Kemi Victoria, Emmanuel, Etuh

    Published in Health informatics journal (01-09-2020)
    “…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
    Get full text
    Journal Article
  11. 11

    An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons by Ghanem, Waheed A. H. M., Jantan, Aman, Ghaleb, Sanaa A. A., Nasser, Abdullah B

    Published in IEEE access (01-01-2020)
    “…One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. The issue has been…”
    Get full text
    Journal Article
  12. 12

    The effects of feature selection on the classification of encrypted botnet by Ismail, Zahian, Jantan, Aman, Yusoff, Mohd. Najwadi, Kiru, Muhammad Ubale

    “…Many applications today are using an encrypted channel to secure their communication and transactions. Though, their security is often challenged by…”
    Get full text
    Journal Article
  13. 13

    A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems by Omolara, Abiodun Esther, Jantan, Aman, Isaac Abiodun, Oludare, Victoria Dada, Kemi, Arshad, Humaira, Emmanuel, Etuh

    Published in IEEE access (2019)
    “…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
    Get full text
    Journal Article
  14. 14

    Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse by Ahmed, Abdulghani Ali, Jantan, Aman, Rasmi, Mohammed

    Published in Journal of network and systems management (01-06-2013)
    “…Bandwidth abuse is a critical Internet service violation. However, its origins are difficult to detect and trace given similarities between abusive and normal…”
    Get full text
    Journal Article
  15. 15

    Formal knowledge model for online social network forensics by Arshad, Humaira, Jantan, Aman, Hoon, Gan Keng, Abiodun, Isaac Oludare

    Published in Computers & security (01-02-2020)
    “…Currently, examining social media networks is an integral part of most investigations. However, getting a clear view of the events relevant to the incident…”
    Get full text
    Journal Article
  16. 16

    Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization by Ghanem, Waheed A. H. M., Jantan, Aman

    Published in Neural processing letters (01-02-2020)
    “…Arguably the most recurring issue concerning network security is building an approach that is capable of detecting intrusions into network systems. This issue…”
    Get full text
    Journal Article
  17. 17

    A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons by Ghanem, Waheed A. H. M., Jantan, Aman

    Published in Cognitive computation (01-12-2018)
    “…The objective of this article is twofold. On the one hand, we introduce a cognitively inspired hybridization metaheuristic that combines the strengths of two…”
    Get full text
    Journal Article
  18. 18

    Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems by Ghanem, Waheed A. H. M., Jantan, Aman

    Published in Neural computing & applications (01-07-2018)
    “…The aim of the study was to propose a new metaheuristic algorithm that combines parts of the well-known artificial bee colony (ABC) optimization with elements…”
    Get full text
    Journal Article
  19. 19

    Filtration model for the detection of malicious traffic in large-scale networks by Ahmed, Abdulghani Ali, Jantan, Aman, Wan, Tat-Chee

    Published in Computer communications (15-05-2016)
    “…•Simulation scenarios are conducted to monitor user violations on QoS regulations.•Possible violations are investigated to differentiate malicious traffic from…”
    Get full text
    Journal Article
  20. 20

    An enhanced Bat algorithm with mutation operator for numerical optimization problems by Ghanem, Waheed A. H. M., Jantan, Aman

    Published in Neural computing & applications (01-01-2019)
    “…This article introduces a new variation of a known metaheuristic method for solving global optimization problems. The proposed algorithm is based on the Bat…”
    Get full text
    Journal Article