Book Details

AN ANALYSIS OF RACIALISM IN TWITTER DATASET THROUGH WEBPAGE BASED ON TRUTH CLASSIFICATION AND VIRTUALIZATION

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Monitoring social media and Internet traffic, as well as cyberattack detection and protection, is crucial. Automated, machine-learning technologies are progressively replacing conventional methods that use manually established criteria. Large data sets that allow machine learning algorithms with outstanding performance have accelerated the change. The article discusses the most recent analysis of internet and social network traffic using a variety of common concepts including similarity, correlation, and collective indication as well as security goals for categorising network hosts, programmes, users, and tweets. The study demonstrates a cutting-edge method for analysing social media and Internet traffic while studying data-driven cyber security. The three elements of the cyber security strategy are cyber security modelling, cyber safety engineering, and cyber security. Discussions on the difficulties and potential possibilities for the field will also take place. Data-driven cyber security solutions that are used to networks with tens of thousands of edges continue to provide theoretical assurance on the quality of the solution. An algorithm for learning to develop a striking oneself to avoid walking is an evaluation of research. Low memory requirements enable scheduling of millions of threads to disguise latency and manage massive networks.

References

1. Solar Power Forecasting Based on Ensemble Learning method: Naylene Fraccanabbia, Ramon Gomes da Silva, Matheus Henrique Dal Molin Ribeiro, Sinvaldo Rodrigues Moreno, Leandro dos Santos Coelho, Viviana Cocco Mariani_2020
2. Rajkumar, V., and V. Maniraj. "HYBRID TRAFFIC ALLOCATION USING APPLICATION-AWARE ALLOCATION OF RESOURCES IN CELLULAR NETWORKS." Shodhsamhita (ISSN: 2277-7067) 12.8 (2021).
3. An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics: Faheem Ullah, Muhammad Ali Babar_2019 

4. Data-driven failure analysis for the cyber physical infrastructures: Viacheslav Belenko, Valery Chernenko, Vasiliy Krundyshev,Maxim Kalinin_2019
5. Rajkumar, V., and V. Maniraj. "HCCLBA: Hop-By-Hop Consumption Conscious Load Balancing Architecture Using Programmable Data Planes." Webology (ISSN: 1735-188X) 18.2 (2021).
6. Impact Analysis of Data Integrity Attacks on Power Electronics and Electric Drives: Bowen Yang, Lulu Guo, Fangyu Li, Jin Ye, Wenzhan Song_2019
7. Detecting Spam Tweets Using Lightweight Detectors on Real-Time Basis and Update the Models Periodically in Batch Mode: K. Jyothsna Reddy, R Sampath Reddy, P Vamsheedhar Reddy_2019
8. Rajkumar, V., and V. Maniraj. "RL-ROUTING: A DEEP REINFORCEMENT LEARNING SDN ROUTING ALGORITHM." JOURNAL OF EDUCATION: RABINDRABHARATI UNIVERSITY (ISSN: 0972-7175) 24.12 (2021).
9. Detecting Spam Images with Embedded Arabic Text in Twitter: Niddal Imam, Vassilios Vassilakis_2019
10. Adaptive Prediction of Spam Emails : Using Bayesian Inference: Lakshmana Phaneendra Maguluri, R. Ragupathy, Sita Rama Krishna Buddi, Vamshi Ponugoti, Tharun Sai Kalimil_2019
11. Rajkumar, V., and V. Maniraj. "Software-Defined Networking's Study with Impact on Network Security." Design Engineering (ISSN: 0011-9342) 8 (2021).
12. Comment Spam Detection via Effective Features Combination: Meng Li, Bin Wu, Yaning Wang_2019
13. Rajkumar, V., and V. Maniraj. "Dependency Aware Caching (Dac) For Software Defined Networks." Webology (ISSN: 1735-188X) 18.5 (2021).
14. Recognizing Email Spam from Meta Data Only: Tim Krause, Rafael Uetz, Tim Kretschmann_2019
15. Rajkumar, V., and V. Maniraj. "PRIVACY-PRESERVING COMPUTATION WITH AN EXTENDED FRAMEWORK AND FLEXIBLE ACCESS CONTROL." ?????? (?????) 48.10 (2021).
16. Joint Spatial and Discrete Cosine Transform Domain-Based Counter Forensics for Adaptive Contrast Enhancement: Ambuj Mehrish, A. V. Subramanyam, Sabu Emmanuel_2019

Keywords

Cyber Security, Data Mining, Classification, Virtualization.

Image
  • Format Volume 10, Issue 2, No 5, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author A.Noorish Banu, R.Kavitha
  • Reference IJCS-442
  • Page No 2978-2986

Copyright 2024 SK Research Group of Companies. All Rights Reserved.