Claim Missing Document
Check
Articles

Found 12 Documents
Search

Advanced risk assessment using machine learning and sentiment analysis on log data Turab, Nidal; Abushattal, Abdelrahman; Al-Nabulsi, Jamal; Owida, Hamza Abu
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 5: October 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i5.pp3897-3905

Abstract

Standard risk assessment approaches are sometimes time-consuming and subjective. In order to overcome these challenges an innovative method will be presented in this article by mixing sentiment analysis and machine learning (ML). The suggested technique improves the effectiveness, precision, and scope of risk insights when it comes to the detection of feelings in logs via the use of automated data collection. The research examines several different ML classifiers and makes use of a deep learning model that has been pre-trained to evaluate risks in logs that are multi-linguistic. This proves the adaptability and scalability of our technique when used in a multilanguage setting. This combination of sentiment analysis and ML are a significant advancement in comparison to traditional approaches since it enables real-time processing and delivers important insights into the management of organizational risks.
Challenges in applying DeepInsight for cyber threat detection AL-Essa, Malik; Qatawneh, Mohammad; Turab, Nidal; Alsarhan, Yazeed
Bulletin of Electrical Engineering and Informatics Vol 15, No 2: April 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v15i2.9649

Abstract

As the world suffers from intrusions and malware extensively nowadays, intru-sion detection systems (IDS) play a critical role in protecting cyberspace from attacks. However, attacks become more complex every day, leading to the neces-sity of developing new techniques that can protect our digital infrastructure from cyber-attacks. Deep learning (DL) is one of the techniques that are investigated to fight against cyber-attacks. However, due to the nature of traffic data, most of the techniques focus on the deep neural network (DNN) as the performance of the DNN dependsonthetraining data. In this paper, we investigate the effective-ness of using convolutional neural networks (CNN) to detect malware apps and network intrusions. The cybersecurity datasets are converted from tabular data into images using the DeepInsight technique. Experiments are conducted using two datasets, NSL-KDD and CICMaldroid20 datasets. The proposed method demonstrates that converting cybersecurity datasets from tabular data into im-ages may decrease the model’s accuracy. Furthermore, this approach introduces additional challenges in the detection of network intrusions and malware. More-over, the added architectural complexity may cause a dilution or distortion of feature representations, making it harder for the model to preserve the original semantic meaning of critical features.