Predicting the success of suicide terrorist attacks using different machine learning algorithms
Extremism has become one of the major threats throughout the world over the past few decades. In the last two decades, there has been a sharp increase in extremism and terrorist attacks. Nowadays, terrorism concerns all nations in terms of national security and is considered one of the most priority...
| Main Authors: | Hossain, Md Junayed, Abdullah, Sheikh Md, Barkatullah, Mohammad, Miahh, Md Saef Ulla, Sarwar, Talha, Monir, Md Fahad |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39083/ http://umpir.ump.edu.my/id/eprint/39083/1/Predicting%20the%20success%20of%20suicide%20terrorist%20attacks%20using%20different%20machine.pdf http://umpir.ump.edu.my/id/eprint/39083/2/Predicting%20the%20success%20of%20suicide%20terrorist%20attacks%20using%20different%20machine%20learning%20algorithms_ABS.pdf |
Similar Items
Impact of COVID-19 Lockdowns on air quality in Bangladesh : Analysis and AQI forecasting with support vector regression
by: Hossain, Mohammed Tahmid, et al.
Published: (2023)
by: Hossain, Mohammed Tahmid, et al.
Published: (2023)
An adaptive medical cyber-physical system for post diagnosis patient care using cloud computing and machine learning approach
by: Miah, Md Saef Ullah, et al.
Published: (2022)
by: Miah, Md Saef Ullah, et al.
Published: (2022)
Performance comparison of HTTP/2 for common e-commerce web frameworks with traditional HTTP
by: Md Siduzzaman, ., et al.
Published: (2020)
by: Md Siduzzaman, ., et al.
Published: (2020)
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
by: Islam, Saima Sharleen, et al.
Published: (2022)
by: Islam, Saima Sharleen, et al.
Published: (2022)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Medical Named Entity Recognition (MedNER): Deep learning model for recognizing medical entities (drug, disease) from scientific texts
by: Miah, Md Saef Ullah, et al.
Published: (2023)
by: Miah, Md Saef Ullah, et al.
Published: (2023)
Predicting young imposter syndrome using ensemble learning
by: Khan, Md. Nafiul Alam, et al.
Published: (2022)
by: Khan, Md. Nafiul Alam, et al.
Published: (2022)
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
by: Sarwar, Talha, et al.
Published: (2022)
by: Sarwar, Talha, et al.
Published: (2022)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Multi input intervention model for evaluating the impact of the asian crisis and terrorist attacks on tourist arrivals
by: Lee, Muhammad Hisyam, et al.
Published: (2010)
by: Lee, Muhammad Hisyam, et al.
Published: (2010)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
A material named entity recognition model using domain embedded bi-lstm and hybrid cosine with wordvector similarity approach
by: Miah, Md Saef Ullah
Published: (2024)
by: Miah, Md Saef Ullah
Published: (2024)
Predicting Suicidal Ideation Via Social Media
by: Boon, Kar Lih
Published: (2023)
by: Boon, Kar Lih
Published: (2023)
A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision
by: Mizanur, Rahman, et al.
Published: (2024)
by: Mizanur, Rahman, et al.
Published: (2024)
Review and empirical analysis of machine learning-based software effort estimation
by: Rahman, Mizanur, et al.
Published: (2024)
by: Rahman, Mizanur, et al.
Published: (2024)
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
by: Thrupthi, C.P., et al.
Published: (2024)
by: Thrupthi, C.P., et al.
Published: (2024)
An automated materials and processes identification tool for material informatics using deep learning approach
by: Miah, M. Saef Ullah, et al.
Published: (2023)
by: Miah, M. Saef Ullah, et al.
Published: (2023)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
An efficientnet to classify monkeypox-comparable skin lesions using transfer learning
by: Hossen, Md Rifat, et al.
Published: (2023)
by: Hossen, Md Rifat, et al.
Published: (2023)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Material named entity recognition (MNER) for knowledge-driven materials using deep learning approach
by: Miah, Md Saef Ullah, et al.
Published: (2023)
by: Miah, Md Saef Ullah, et al.
Published: (2023)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Study of keyword extraction techniques for electric double-layer capacitor domain using text similarity indexes: An experimental analysis
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Breast cancer prediction: A comparative study using machine learning techniques
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Software effort estimation using machine learning technique
by: Rahman, Mizanur, et al.
Published: (2023)
by: Rahman, Mizanur, et al.
Published: (2023)
Predicting android app success before google play store launch using machine learning
by: Aleem, Muhammad, et al.
Published: (2024)
by: Aleem, Muhammad, et al.
Published: (2024)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Similar Items
-
Impact of COVID-19 Lockdowns on air quality in Bangladesh : Analysis and AQI forecasting with support vector regression
by: Hossain, Mohammed Tahmid, et al.
Published: (2023) -
An adaptive medical cyber-physical system for post diagnosis patient care using cloud computing and machine learning approach
by: Miah, Md Saef Ullah, et al.
Published: (2022) -
Performance comparison of HTTP/2 for common e-commerce web frameworks with traditional HTTP
by: Md Siduzzaman, ., et al.
Published: (2020) -
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
by: Islam, Saima Sharleen, et al.
Published: (2022) -
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)