[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …
education, home, vehicles, or healthcare. With the increase in the number of connected …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
Porosity prediction: Supervised-learning of thermal history for direct laser deposition
The objective of this study is to investigate the relationship between the melt pool
characteristics and the defect occurrence in an as-built additive manufacturing part. One of …
characteristics and the defect occurrence in an as-built additive manufacturing part. One of …
Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems
BB Gupta, A Gaurav, EC Marín… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the
driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …
driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
The Botnets have become one of the most serious threats to cyber infrastructure. Most
existing work on detecting botnets is based on flow-based traffic analysis by mining their …
existing work on detecting botnets is based on flow-based traffic analysis by mining their …
In-situ monitoring of melt pool images for porosity prediction in directed energy deposition processes
One major challenge of implementing Directed Energy Deposition (DED) Additive
Manufacturing (AM) for production is the lack of understanding of its underlying process …
Manufacturing (AM) for production is the lack of understanding of its underlying process …
Machine learning and deep learning techniques for cybersecurity: a review
SA Salloum, M Alshurideh, A Elnagar… - … Conference on Artificial …, 2020 - Springer
In this review, significant literature surveys on machine learning (ML) and deep learning
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …
An adaptive multi-layer botnet detection technique using machine learning classifiers
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …