[PDF][PDF] Best ways computation intelligent of face cyber attacks

B Alhayani, ST Abbas, DZ Khutar… - Materials Today …, 2021 - academia.edu
abstract The rising of information and communication technologies brought about new
challenges that need to be dealt with is the citizens' security is considered. Undoubtedly, the …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

Classification and prediction of significant cyber incidents (SCI) using data mining and machine learning (DM-ML)

G Mumtaz, S Akram, MW Iqbal, MU Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The rapid growth in technology and several IoT devices make cyberspace unsecure and
eventually lead to Significant Cyber Incidents (SCI). Cyber Security is a technique that …

[HTML][HTML] Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application

A Shan, S Myeong - Sensors, 2024 - mdpi.com
Cyber-security challenges are growing globally and are specifically targeting critical
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …

EmSM: ensemble mixed sampling method for classifying imbalanced intrusion detection data

I Jung, J Ji, C Cho - Electronics, 2022 - mdpi.com
Research on the application of machine learning to the field of intrusion detection is
attracting great interest. However, depending on the application, it is difficult to collect the …

[PDF][PDF] Cyber security: performance analysis and challenges for cyber attacks detection

AA Salih, MB Abdulrazzaq - Indonesian Journal of Electrical …, 2023 - academia.edu
Nowadays, with the occurrence of new attacks and raised challenges have been facing the
security of computer systems. Cyber security techniques have become essential for …

Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep)

AE Ibor, FA Oladeji, OB Okunoye… - … Security Journal: A …, 2022 - Taylor & Francis
Some of the problems of extant cyberattack prediction approaches are low prediction
accuracy, high false positive rate, very long training time, and the choice of hyperparameters …

PF-TL: Payload feature-based transfer learning for dealing with the lack of training data

I Jung, J Lim, HK Kim - Electronics, 2021 - mdpi.com
The number of studies on applying machine learning to cyber security has increased over
the past few years. These studies, however, are facing difficulties with making themselves …

Anomaly detection approach for urban sensing based on credibility and time-series analysis optimization model

H Zhang, Z Li - IEEE Access, 2019 - ieeexplore.ieee.org
Urban sensor networks often consist of a large number of low-cost sensor nodes. Due to the
constrained resource devices and hazardous deployment, urban sensing is vulnerable to …

A survey of cyber security approaches for prediction

H Liu, R Jiang, B Zhou, X Rong, J Li… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
This paper provides an overview of related prediction techniques used in the field of cyber
security, and discusses three main types of cyber security prediction tasks: projection and …