[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Porosity prediction: Supervised-learning of thermal history for direct laser deposition

M Khanzadeh, S Chowdhury, M Marufuzzaman… - Journal of manufacturing …, 2018 - Elsevier
The objective of this study is to investigate the relationship between the melt pool
characteristics and the defect occurrence in an as-built additive manufacturing part. One of …

Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems

BB Gupta, A Gaurav, EC Marín… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the
driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

W Wang, Y Shang, Y He, Y Li, J Liu - Information Sciences, 2020 - Elsevier
The Botnets have become one of the most serious threats to cyber infrastructure. Most
existing work on detecting botnets is based on flow-based traffic analysis by mining their …

In-situ monitoring of melt pool images for porosity prediction in directed energy deposition processes

M Khanzadeh, S Chowdhury, MA Tschopp… - IISE …, 2019 - Taylor & Francis
One major challenge of implementing Directed Energy Deposition (DED) Additive
Manufacturing (AM) for production is the lack of understanding of its underlying process …

Machine learning and deep learning techniques for cybersecurity: a review

SA Salloum, M Alshurideh, A Elnagar… - … Conference on Artificial …, 2020 - Springer
In this review, significant literature surveys on machine learning (ML) and deep learning
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …

An adaptive multi-layer botnet detection technique using machine learning classifiers

RU Khan, X Zhang, R Kumar, A Sharif, NA Golilarz… - Applied Sciences, 2019 - mdpi.com
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …