Picture for Iqbal H. Sarker

Iqbal H. Sarker

Edith Cowan University, Perth, Australia

A Unified Framework for Human AI Collaboration in Security Operations Centers with Trusted Autonomy

Add code
May 29, 2025
Viaarxiv icon

ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

Add code
May 12, 2024
Viaarxiv icon

A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors

Add code
Mar 28, 2024
Figure 1 for A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors
Figure 2 for A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors
Figure 3 for A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors
Figure 4 for A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors
Viaarxiv icon

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Add code
Feb 21, 2024
Figure 1 for An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach
Figure 2 for An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach
Figure 3 for An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach
Figure 4 for An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach
Viaarxiv icon

Agricultural Recommendation System based on Deep Learning: A Multivariate Weather Forecasting Approach

Add code
Jan 21, 2024
Viaarxiv icon

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

Add code
Jan 07, 2024
Figure 1 for Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis
Figure 2 for Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis
Figure 3 for Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis
Figure 4 for Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis
Viaarxiv icon

Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets

Add code
Dec 02, 2023
Figure 1 for Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets
Figure 2 for Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets
Figure 3 for Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets
Figure 4 for Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets
Viaarxiv icon

A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets

Add code
Aug 13, 2021
Figure 1 for A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets
Figure 2 for A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets
Figure 3 for A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets
Figure 4 for A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets
Viaarxiv icon

Emotion Classification in a Resource Constrained Language Using Transformer-based Approach

Add code
Apr 17, 2021
Figure 1 for Emotion Classification in a Resource Constrained Language Using Transformer-based Approach
Figure 2 for Emotion Classification in a Resource Constrained Language Using Transformer-based Approach
Figure 3 for Emotion Classification in a Resource Constrained Language Using Transformer-based Approach
Figure 4 for Emotion Classification in a Resource Constrained Language Using Transformer-based Approach
Viaarxiv icon

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Add code
Mar 28, 2021
Figure 1 for CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks
Figure 2 for CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks
Figure 3 for CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks
Figure 4 for CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks
Viaarxiv icon