2021
DOI: 10.3390/electronics10192398
|View full text |Cite
|
Sign up to set email alerts
|

Suicide Bomb Attack Identification and Analytics through Data Mining Techniques

Abstract: Suicide bomb attacks are a high priority concern nowadays for every country in the world. They are a massively destructive criminal activity known as terrorism where one explodes a bomb attached to himself or herself, usually in a public place, taking the lives of many. Terrorist activity in different regions of the world depends and varies according to geopolitical situations and significant regional factors. There has been no significant work performed previously by utilizing the Pakistani suicide attack dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
3
2

Relationship

5
5

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 43 publications
0
11
0
Order By: Relevance
“…Presently, numerous applications were executed in finance, horticulture, payment, and medication territory. This blockchain technology application is used in air traffic controllers (ATCs) to lessen fracture, failure, and ungraceful activities in the air terminal industry [89][90][91][92][93][94].…”
Section: Industrial and Academic Areamentioning
confidence: 99%
“…Presently, numerous applications were executed in finance, horticulture, payment, and medication territory. This blockchain technology application is used in air traffic controllers (ATCs) to lessen fracture, failure, and ungraceful activities in the air terminal industry [89][90][91][92][93][94].…”
Section: Industrial and Academic Areamentioning
confidence: 99%
“…The IoT devices are susceptible to weaponization and hijacking for the Distributed Denial of Service (DDoS) attacks [13], man-in-the-middle attack [14], targeted code injection [15], and pose estimation [16]. In addition to this, the IoT devices are remotely controlled by the bad actors, creating a significant impact while transmitting data in the network.…”
Section: Introductionmentioning
confidence: 99%
“…On average, 360,000 new malware files were detected every day in 2020, and the number of files found daily has increased by 5.2%. This rapid growth in malware production and distribution became possible due to the use of intelligent and automatic malware generation software such as SpyEye of Zeus and denial of service [2,3]. Newer dangers are evolving as blended threats continue to combine various types of assault into one with more deadly payloads.…”
Section: Introductionmentioning
confidence: 99%