The role of machine learning in network anomaly detection for cybersecurity
A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
[HTML][HTML] Prediction of chloride resistance level of concrete using machine learning for durability and service life assessment of building structures
WZ Taffese, L Espinosa-Leal - Journal of Building Engineering, 2022 - Elsevier
The resistance of concrete to chloride penetration determines the durability and service life
of reinforced concrete building structures in coastal or chloride-laden environments. This …
of reinforced concrete building structures in coastal or chloride-laden environments. This …
[HTML][HTML] Data-driven evolution of water quality models: An in-depth investigation of innovative outlier detection approaches-A case study of Irish Water Quality Index …
Recently, there has been a significant advancement in the water quality index (WQI) models
utilizing data-driven approaches, especially those integrating machine learning and artificial …
utilizing data-driven approaches, especially those integrating machine learning and artificial …
[HTML][HTML] Utilizing ensemble learning in the classifications of ductile and brittle failure modes of UHPC strengthened RC members
This study aims to achieve the swift and precise classification of ductile and brittle failure
modes in flexural reinforced concrete (RC) members, specifically those with tension sides …
modes in flexural reinforced concrete (RC) members, specifically those with tension sides …
Machine Learning Approach for Anomaly-Based Intrusion Detection Systems Using Isolation Forest Model and Support Vector Machine
K Shanthi, R Maruthi - 2023 5th International Conference on …, 2023 - ieeexplore.ieee.org
Cyber Security plays a significant role in almost all the applications in the networks including
host protection, network protection and cloud infrastructure protection. Designing an …
host protection, network protection and cloud infrastructure protection. Designing an …
[PDF][PDF] A Review on Deep-Learning Based Network Intrusion Detection Systems
Network Security is an extremely arising field that secures frameworks, organizations, and
information from advanced attacks. With the evolution of the Internet and the development of …
information from advanced attacks. With the evolution of the Internet and the development of …
Effectively predicting cyber‐attacks through isolation forest learning‐based outlier detection
Due to the popularity of Internet of Things devices, the exponential progress of computer
networks, and a plethora of associated applications, cybersecurity has recently attracted …
networks, and a plethora of associated applications, cybersecurity has recently attracted …
Concrete Aging Factor Prediction Using Machine Learning
Accurate prediction of concrete aging factor is pivotal for performance-based durability
reinforced concrete design. This study introduces an innovative method leveraging machine …
reinforced concrete design. This study introduces an innovative method leveraging machine …
[HTML][HTML] TTANAD: Test-Time Augmentation for Network Anomaly Detection
Machine learning-based Network Intrusion Detection Systems (NIDS) are designed to
protect networks by identifying anomalous behaviors or improper uses. In recent years …
protect networks by identifying anomalous behaviors or improper uses. In recent years …
[HTML][HTML] Towards Benchmarking for Evaluating Machine Learning Methods in Detecting Outliers in Process Datasets
TF Schindler, S Schlicht, KD Thoben - Computers, 2023 - mdpi.com
Within the integration and development of data-driven process models, the underlying
process is digitally mapped in a model through sensory data acquisition and subsequent …
process is digitally mapped in a model through sensory data acquisition and subsequent …