Open Access iconOpen Access

ARTICLE

crossmark

Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks

by Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Lubna A. Alharbi4, Mohamed K. Nour5, Abdullah Mohamed6, Ahmed S. Almasoud7, Abdelwahed Motwakel2

1 Department of Electrical and Computer Engineering, International Islamic University Malaysia, Kuala Lumpur, 53100, Malaysia
2 Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj, 16278, Saudi Arabia
3 Department of Electrical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P. O. Box 84428, Riyadh, 11671, Saudi Arabia
4 Department of Computer Science, College of Computers and Information Technology, Tabuk University, Tabuk, 47512, Saudi Arabia
5 Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Mecca, 24382, Saudi Arabia
6 Research Centre, Future University in Egypt, New Cairo, 11845, Egypt
7 Department of Information Systems, College of Computer and Information Sciences, Prince Sultan University, Riyadh, 12435, Saudi Arabia

* Corresponding Author: Anwer Mustafa Hilal. Email: email

Computer Systems Science and Engineering 2023, 45(2), 2033-2047. https://doi.org/10.32604/csse.2023.031181

Abstract

Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN. For achieving this, the SHODLCS model involves data pre-processing and TF-IDF based feature extraction. In addition, the cascaded recurrent neural network (CRNN) model is applied for the identification and classification of CB. Finally, the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance. The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches.

Keywords


Cite This Article

APA Style
Hilal, A.M., Hashim, A.H.A., Mohamed, H.G., Alharbi, L.A., Nour, M.K. et al. (2023). Spotted hyena optimizer with deep learning driven cybersecurity for social networks. Computer Systems Science and Engineering, 45(2), 2033-2047. https://doi.org/10.32604/csse.2023.031181
Vancouver Style
Hilal AM, Hashim AHA, Mohamed HG, Alharbi LA, Nour MK, Mohamed A, et al. Spotted hyena optimizer with deep learning driven cybersecurity for social networks. Comput Syst Sci Eng. 2023;45(2):2033-2047 https://doi.org/10.32604/csse.2023.031181
IEEE Style
A. M. Hilal et al., “Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks,” Comput. Syst. Sci. Eng., vol. 45, no. 2, pp. 2033-2047, 2023. https://doi.org/10.32604/csse.2023.031181



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1278

    View

  • 528

    Download

  • 0

    Like

Share Link