Alert button
Picture for Mike Nkongolo

Mike Nkongolo

Alert button

Ransomware detection using stacked autoencoder for feature selection

Add code
Bookmark button
Alert button
Feb 17, 2024
Mike Nkongolo, Mahmut Tokmak

Viaarxiv icon

Enhancing search engine precision and user experience through sentiment-based polysemy resolution

Add code
Bookmark button
Alert button
Nov 03, 2023
Mike Nkongolo

Viaarxiv icon

Stacking an autoencoder for feature selection of zero-day threats

Add code
Bookmark button
Alert button
Nov 01, 2023
Mahmut Tokmak, Mike Nkongolo

Viaarxiv icon

Assessing Cyclostationary Malware Detection via Feature Selection and Classification

Add code
Bookmark button
Alert button
Aug 29, 2023
Mike Nkongolo

Figure 1 for Assessing Cyclostationary Malware Detection via Feature Selection and Classification
Figure 2 for Assessing Cyclostationary Malware Detection via Feature Selection and Classification
Figure 3 for Assessing Cyclostationary Malware Detection via Feature Selection and Classification
Figure 4 for Assessing Cyclostationary Malware Detection via Feature Selection and Classification
Viaarxiv icon

Fuzzification-based Feature Selection for Enhanced Website Content Encryption

Add code
Bookmark button
Alert button
Jun 23, 2023
Mike Nkongolo

Figure 1 for Fuzzification-based Feature Selection for Enhanced Website Content Encryption
Viaarxiv icon

Smart Sentiment Analysis-based Search Engine Classification Intelligence

Add code
Bookmark button
Alert button
Jun 16, 2023
Mike Nkongolo

Figure 1 for Smart Sentiment Analysis-based Search Engine Classification Intelligence
Figure 2 for Smart Sentiment Analysis-based Search Engine Classification Intelligence
Figure 3 for Smart Sentiment Analysis-based Search Engine Classification Intelligence
Figure 4 for Smart Sentiment Analysis-based Search Engine Classification Intelligence
Viaarxiv icon

Fuzzy Feature Selection with Key-based Cryptographic Transformations

Add code
Bookmark button
Alert button
Jun 16, 2023
Mike Nkongolo

Figure 1 for Fuzzy Feature Selection with Key-based Cryptographic Transformations
Figure 2 for Fuzzy Feature Selection with Key-based Cryptographic Transformations
Figure 3 for Fuzzy Feature Selection with Key-based Cryptographic Transformations
Figure 4 for Fuzzy Feature Selection with Key-based Cryptographic Transformations
Viaarxiv icon