Hassan S., Noorul
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Self-Supervised Representation Learning for Criminology: Detecting Anomalies, Classifying Reports, and Mapping Networks Hassan S., Noorul; S., Sivalakshmi; M., Janani; A., Fouziya; S., Thirisha
Journal of Technology Informatics and Engineering Vol. 5 No. 1 (2026): APRIL | JTIE : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v5i1.473

Abstract

Crime analysis using various types of data, such as video surveillance, crime reports, and criminal networks, has been widely investigated in digital criminology. Most of the available data are unlabelled. In this work, we introduce a self-supervised learning framework for multimodal criminology, which enables the fully automatic learning of effective features for unlabelled video, text, and graph datasets and the completion of crime analysis tasks, including anomaly detection, crime report classification, and high-risk node prediction via contrastive learning, masked prediction, and graph self-supervised learning. The experimental results show that our SSL model learns high-quality features and achieves better performance than its supervised counterpart and baseline models. Unlike traditional deep learning-based models that require large amounts of labeled data, our proposed SSL model is label-efficient, scalable, and robust to artificial or anonymous data. Our work aims to develop an AI-based multimodal self-supervised learning approach for efficient, accurate, reliable, and safe crime analysis
Automation in Cybersecurity using Machine Learning: A CaseStudy on Anomaly Detection with Isolation Forest Hassan S., Noorul; L., Sandhiya; S., Kavya; E., Priyadharshini; T., Vanmathi
Journal of Technology Informatics and Engineering Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v4i3.478

Abstract

The escalating sophistication of cyber threats necessitates advanced anomaly detection techniques that transcend traditional signature-based methods. This paper presents an automated cybersecurity framework leveraging the Isolation Forest algorithm for unsupervised anomaly detection in network traffic. Using the NSL-KDD dataset, we demonstrate that Isolation Forest achieves 95.2% detection accuracy with a 4.7% false-positive rate, outperforming conventional methods such as One-Class SVM (88.1% accuracy) and Local Outlier Factor (82.3% accuracy) in both computational efficiency and precision. Key advantages include: (1) real-time processing capability (8.2s training time, 4× faster than density-based approaches), (2) effective identification of rare attack types (U2R/R2L), and (3) elimination of dependency on labeled training data. The proposed system integrates dynamic threshold tuning and SHAP-based feature weighting to enhance detection stability and reduce false alarms. The results validate Isolation Forest as a scalable and reliable solution for modern intrusion detection systems, with strong implications for SIEM integration and real-time cybersecurity automation. Challenges in parameter tuning and encrypted traffic analysis are discussed, alongside future directions involving hybrid deep learning architectures.