Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

Machine learning-based botnet detection in software-defined network: A systematic review

K Shinan, K Alsubhi, A Alzahrani, MU Ashraf - Symmetry, 2021 - mdpi.com
In recent decades, the internet has grown and changed the world tremendously, and this, in
turn, has brought about many cyberattacks. Cybersecurity represents one of the most …

Multi-stage optimized machine learning framework for network intrusion detection

MN Injadat, A Moubayed, AB Nassif… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security garnered significant attention due to the increased dependency of individuals
and organizations on the Internet and their concern about the security and privacy of their …

The false positive problem of automatic bot detection in social science research

A Rauchfleisch, J Kaiser - PloS one, 2020 - journals.plos.org
The identification of bots is an important and complicated task. The bot classifier" Botometer"
was successfully introduced as a way to estimate the number of bots in a given list of …

Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems

BB Gupta, A Gaurav, EC Marín… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the
driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …

Botnet detection approach using graph-based machine learning

A Alharbi, K Alsubhi - Ieee Access, 2021 - ieeexplore.ieee.org
Detecting botnet threats has been an ongoing research endeavor. Machine Learning (ML)
techniques have been widely used for botnet detection with flow-based features. The prime …

Social bots detection via fusing bert and graph convolutional networks

Q Guo, H Xie, Y Li, W Ma, C Zhang - Symmetry, 2021 - mdpi.com
The online social media ecosystem is becoming more and more confused because of more
and more fake information and the social media of malicious users' fake content; at the same …

A secure network model against bot attacks in edge-enabled industrial Internet of Things

VA Memos, KE Psannis, Z Lv - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
The new Industry 4.0 standard has offered many advantages to the industries improving
their production rate since it evaluates novel cutting-edge technologies like artificial …

Dfedforest: Decentralized federated forest

LAC de Souza, GAF Rebello, GF Camilo… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
The effectiveness of machine learning systems depends heavily on the relevance of the
training data. Usually, the collected data is sensitive and private because it comes from …

A review on graph-based approaches for network security monitoring and botnet detection

S Lagraa, M Husák, H Seba, S Vuppala, R State… - International Journal of …, 2024 - Springer
This survey paper provides a comprehensive overview of recent research and development
in network security that uses graphs and graph-based data representation and analytics …