Search
Now showing items 11-20 of 31
Credit Card Fraud Detection Predictive Modeling
(North Dakota State University, 2020)
Finance fraud is a growing problem with consequences in the financial industry and data mining has been successfully applied to huge volume of complex financial datasets to automate and analyze credit card frauds in online ...
Comparison Analysis of Classification Algorithms for Intrusion Detection
(North Dakota State University, 2021)
As the Internet of Things becomes more prevalent in our lives, we are confronted with more security concerns. Network attacks have become more common in the cyber world these days. Denial of service, Prove, Remote to Local ...
Investigating Super Learner on Healthcare Data Sets
(North Dakota State University, 2021)
In the field of machine learning, classification is the essential task that predicts the target class or label for each sample in the data. Improving the performance of a classification model has been a challenging research ...
Covid-19 Face Cover Tracker Using Amazon Web Services
(North Dakota State University, 2021)
Numerous studies have shown that wearing face covers and following other social distancing guidelines reduce community transmission of air borne diseases like COVID-19 during a pandemic. While public health administrators ...
Evaluating the Effectiveness of Music Recommendations Using Cosine Similarities of Various Combined Feature Sets Consisting of Metadata and User Generated Tags
(North Dakota State University, 2022)
This paper aims to compare and evaluate the methods for recommending songs using metadata, user generated tags, metadata and tags, and metadata and top five tags. Recommendations are calculated using cosine similarities ...
CHAPS Online
(North Dakota State University, 2022)
This paper explores the application development phases of the online version of Cow Herd Appraisal Performance Software (CHAPS). Beef producers and Extension professionals have been using CHAPS since 1985 as a herd management ...
Threat Identification from Access Logs Using Elastic Stack
(North Dakota State University, 2020)
Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...
Analyzing Three Different Tuning Strategies for Random Forest Hyperparameters for Fraud Detection
(North Dakota State University, 2021)
Technology is advancing rapidly, and more tasks are becoming online than ever. Along with the benefits comes the disadvantages of this great advancement. While online services relieve from the struggle of in person activities, ...
Feature Engineering on the Cybersecurity Dataset for Deployment on Software Defined Network
(North Dakota State University, 2020)
These days, due to dependency on the fast-moving world's modern technology, the increasing use of smart devices and the internet affect network traffic. Many intrusion detection studies concentrate on feature selection or ...
Zero-Trust Architecture and Its Cost-Effectiveness on Network Security
(North Dakota State University, 2022)
Zero-Trust Architecture (ZTA) is a ‘Never Trust, Always Verify’ concept to improve cybersecurity by eliminating trust and validating network requests continuously. ZTA replaces Virtual Private Networks (VPNs) and provides ...