Skip to main content

Research Repository

Advanced Search

All Outputs (61)

Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection (2024)
Thesis
Salloum, S. (2024). Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection. (Thesis). University of Salford

Phishing is a significant threat to the modern world, causing considerable financial losses. Although electronic mail has shown to be a valuable asset around the world in terms of facilitating communication for all parties involved, whether huge corp... Read More about Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection.

Towards Explainable Deep Learning Models for Fault Prediction based on IoT Sensor Data (2024)
Thesis
Mansouri, T. (2024). Towards Explainable Deep Learning Models for Fault Prediction based on IoT Sensor Data. (Thesis). University of Salford

This thesis addresses a pressing issue in the realm of IoT-based fault prediction using sensor data, focusing on the crucial yet challenging aspect of explainability within deep learning models. While deep learning has showcased remarkable advancemen... Read More about Towards Explainable Deep Learning Models for Fault Prediction based on IoT Sensor Data.

A New English/Arabic Parallel Corpus for Phishing Emails (2023)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (in press). A New English/Arabic Parallel Corpus for Phishing Emails. #Journal not on list, https://doi.org/10.1145/3606031

Phishing involves malicious activity whereby phishers, in the disguise of legitimate entities, obtain illegitimate access to the victims’ personal and private information, usually through emails. Currently, phishing attacks and threats are being hand... Read More about A New English/Arabic Parallel Corpus for Phishing Emails.

Explainable fault prediction using learning fuzzy cognitive maps (2023)
Journal Article
Mansouri, T., & Vadera, S. (2023). Explainable fault prediction using learning fuzzy cognitive maps. Expert Systems, 40(8), https://doi.org/10.1111/exsy.13316

IoT sensors capture different aspects of the environment and generate high throughput data streams. Besides capturing these data streams and reporting the monitoring information, there is significant potential for adopting deep learning to identify v... Read More about Explainable fault prediction using learning fuzzy cognitive maps.

A deep explainable model for fault prediction using IoT sensors (2022)
Journal Article
Mansouri, T., & Vadera, S. (2022). A deep explainable model for fault prediction using IoT sensors. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3184693

IoT sensors and deep learning models can widely be applied for fault prediction. Although deep learning models are considerably more potent than many conventional machine learning models, they are not transparent. This paper first examines differen... Read More about A deep explainable model for fault prediction using IoT sensors.

A systematic literature review on phishing email detection using natural language processing techniques (2022)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2022). A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access, 10, 65703-65727. https://doi.org/10.1109/access.2022.3183083

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about A systematic literature review on phishing email detection using natural language processing techniques.

Methods for pruning deep neural networks (2022)
Journal Article
Vadera, S., & Ameen, S. (2022). Methods for pruning deep neural networks. IEEE Access, 63280- 63300. https://doi.org/10.1109/ACCESS.2022.3182659

This paper presents a survey of methods for pruning deep neural networks. It begins by categorising over 150 studies based on the underlying approach used and then focuses on three categories: methods that use magnitude based pruning, methods that... Read More about Methods for pruning deep neural networks.

Development of an evolutionary cost sensitive decision tree induction algorithm (2022)
Presentation / Conference
Kassim, M., & Vadera, S. (2022, May). Development of an evolutionary cost sensitive decision tree induction algorithm. Presented at 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), Sabratha, Libya

This paper develops an Evolutionary Elliptical Cost-Sensitive Decision Tree Algorithm (EECSDT) which learns cost-sensitive non-linear decision trees for multiclass problems. EECSDT is developed by formulating the problem as an optimization task in wh... Read More about Development of an evolutionary cost sensitive decision tree induction algorithm.

Phishing website detection from URLs using classical machine learning ANN model (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing website detection from URLs using classical machine learning ANN model. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Internet), 2, 509-523. https://doi.org/10.1007/978-3-030-90022-9_28

Phishing is a serious form of online fraud made up of spoofed websites that attempt to gain users’ sensitive information by tricking them into believing that they are visiting a legitimate site. Phishing attacks can be detected many ways, including a... Read More about Phishing website detection from URLs using classical machine learning ANN model.

Cost-sensitive meta-learning framework (2021)
Journal Article
Shilbayeh, S., & Vadera, S. (2021). Cost-sensitive meta-learning framework. Journal of Modelling in Management, https://doi.org/10.1108/JM2-03-2021-0065

Purpose This paper aims to describe the use of a meta-learning framework for recommending cost-sensitive classification methods with the aim of answering an important question that arises in machine learning, namely, “Among all the available classif... Read More about Cost-sensitive meta-learning framework.

Phishing email detection using Natural Language Processing techniques : a literature survey (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing email detection using Natural Language Processing techniques : a literature survey. Procedia Computer Science, 189, 19-28. https://doi.org/10.1016/j.procs.2021.05.077

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about Phishing email detection using Natural Language Processing techniques : a literature survey.

EBNO : evolution of cost-sensitive Bayesian networks (2019)
Journal Article
Nashnush, E., & Vadera, S. (2020). EBNO : evolution of cost-sensitive Bayesian networks. Expert Systems, 37(3), e12495. https://doi.org/10.1111/exsy.12495

The last decade has seen an increase in the attention paid to the development of cost sensitive learning algorithms that aim to minimize misclassification costs while still maintaining accuracy. Most of this attention has been on cost sensitive dec... Read More about EBNO : evolution of cost-sensitive Bayesian networks.

Pruning neural networks using multi-armed bandits (2019)
Journal Article
Ameen, S., & Vadera, S. (2020). Pruning neural networks using multi-armed bandits. Computer Journal, 63(7), 1099-1108. https://doi.org/10.1093/comjnl/bxz078

The successful application of deep learning has led to increasing expectations of their use in embedded systems. This in turn, has created the need to find ways of reducing the size of neural networks. Decreasing the size of a neural network requi... Read More about Pruning neural networks using multi-armed bandits.

Natural Language Processing and Information Systems : 24th International Conference on applications of natural language to information systems, NLDB 2019, Salford, UK, June 26–28, 2019, proceedings (2019)
Book
24th International Conference on applications of natural language to information systems, NLDB 2019, Salford, UK, June 26–28, 2019, proceedings. Switzerland: Springer Nature Switzerland. https://doi.org/10.1007/978-3-030-23281-8

This book constitutes the refereed proceedings of the 24th International Conference on Applications of Natural Language to Information Systems, NLDB 2019, held in Salford, UK, in June 2019. The 21 full papers and 16 short papers were carefully re... Read More about Natural Language Processing and Information Systems : 24th International Conference on applications of natural language to information systems, NLDB 2019, Salford, UK, June 26–28, 2019, proceedings.

Case studies in applying data mining for churn analysis (2017)
Journal Article
Lomax, S., & Vadera, S. (2017). Case studies in applying data mining for churn analysis. International Journal of Conceptual Structures and Smart Applications, 5(2), 22-33. https://doi.org/10.4018/ijcssa.2017070102

The advent of price and product comparison sites now makes it even more important to retain customers and identify those that might be at risk of leaving. The use of data mining methods has been widely advocated for predicting customer churn. This pa... Read More about Case studies in applying data mining for churn analysis.

A social norms approach to changing school children’s perceptions of tobacco usage (2017)
Journal Article
Sheikh, A., Vadera, S., Ravey, M., Lovatt, G., & Kelly, G. (2017). A social norms approach to changing school children’s perceptions of tobacco usage. Health Education, 117(6), 530-539. https://doi.org/10.1108/he-01-2017-0006

Purpose: Over 200,000 young people in the UK embark on a smoking career annually, thus continued effort is required to understand the types of interventions that are most effective in changing perceptions about smoking amongst teenagers. Several auth... Read More about A social norms approach to changing school children’s perceptions of tobacco usage.

A convolutional neural network to classify American Sign Language fingerspelling from depth and colour images (2017)
Journal Article
Ameen, S., & Vadera, S. (2017). A convolutional neural network to classify American Sign Language fingerspelling from depth and colour images. Expert Systems, 34(3), e12197. https://doi.org/10.1111/exsy.12197

Sign language is used by approximately 70 million1 people throughout the world, and an automatic tool for interpreting it could make a major impact on communication between those who use it and those who may not understand it. However, computer inte... Read More about A convolutional neural network to classify American Sign Language fingerspelling from depth and colour images.

Learning cost-sensitive Bayesian networks via direct and indirect methods (2016)
Journal Article
Nashnush, E., & Vadera, S. (2017). Learning cost-sensitive Bayesian networks via direct and indirect methods. Integrated Computer-Aided Engineering, 24(1), 17-26. https://doi.org/10.3233/ICA-160514

Cost-Sensitive learning has become an increasingly important area that recognizes that real world classification problems need to take the costs of misclassification and accuracy into account. Much work has been done on cost-sensitive decision tree l... Read More about Learning cost-sensitive Bayesian networks via direct and indirect methods.

Natural language processing and information systems : 21st International Conference on Applications of Natural Language to Information Systems, NLDB 2016, Salford, UK, June 22-24, 2016, Proceedings (2016)
Book
(2016). E. Metais, F. Meziane, M. Saraee, V. Sugumaran, S. Vadera, E. Métais, …S. Vadera (Eds.), Natural language processing and information systems : 21st International Conference on Applications of Natural Language to Information Systems, NLDB 2016, Salford, UK, June 22-24, 2016, Proceedings. Springer. https://doi.org/10.1007/978-3-319-41754-7

This volume of the lecture notes in computer science (LNCS) contains the papers presented at the 21st International Conference on application of Natural Language to Information Systems, held at MediacityUK, University of Salford on the 22-24 June 201... Read More about Natural language processing and information systems : 21st International Conference on Applications of Natural Language to Information Systems, NLDB 2016, Salford, UK, June 22-24, 2016, Proceedings.

A cost-sensitive decision tree learning algorithm based on a multi-armed bandit framework (2016)
Journal Article
Lomax, S., & Vadera, S. (2017). A cost-sensitive decision tree learning algorithm based on a multi-armed bandit framework. Computer Journal, 60(7), 941-956. https://doi.org/10.1093/comjnl/bxw015

This paper develops a new algorithm for inducing cost-sensitive decision trees that is inspired by the multi-armed bandit problem, in which a player in a casino has to decide which slot machine (bandit) from a selection of slot machines is likely to... Read More about A cost-sensitive decision tree learning algorithm based on a multi-armed bandit framework.