[PDF][PDF] Best ways computation intelligent of face cyber attacks
abstract The rising of information and communication technologies brought about new
challenges that need to be dealt with is the citizens' security is considered. Undoubtedly, the …
challenges that need to be dealt with is the citizens' security is considered. Undoubtedly, the …
Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective
H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …
scope of cybersecurity research topics. This paper proposes a grouping and classifications …
Classification and prediction of significant cyber incidents (SCI) using data mining and machine learning (DM-ML)
The rapid growth in technology and several IoT devices make cyberspace unsecure and
eventually lead to Significant Cyber Incidents (SCI). Cyber Security is a technique that …
eventually lead to Significant Cyber Incidents (SCI). Cyber Security is a technique that …
[HTML][HTML] Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
A Shan, S Myeong - Sensors, 2024 - mdpi.com
Cyber-security challenges are growing globally and are specifically targeting critical
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …
EmSM: ensemble mixed sampling method for classifying imbalanced intrusion detection data
I Jung, J Ji, C Cho - Electronics, 2022 - mdpi.com
Research on the application of machine learning to the field of intrusion detection is
attracting great interest. However, depending on the application, it is difficult to collect the …
attracting great interest. However, depending on the application, it is difficult to collect the …
[PDF][PDF] Cyber security: performance analysis and challenges for cyber attacks detection
AA Salih, MB Abdulrazzaq - Indonesian Journal of Electrical …, 2023 - academia.edu
Nowadays, with the occurrence of new attacks and raised challenges have been facing the
security of computer systems. Cyber security techniques have become essential for …
security of computer systems. Cyber security techniques have become essential for …
Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep)
Some of the problems of extant cyberattack prediction approaches are low prediction
accuracy, high false positive rate, very long training time, and the choice of hyperparameters …
accuracy, high false positive rate, very long training time, and the choice of hyperparameters …
PF-TL: Payload feature-based transfer learning for dealing with the lack of training data
I Jung, J Lim, HK Kim - Electronics, 2021 - mdpi.com
The number of studies on applying machine learning to cyber security has increased over
the past few years. These studies, however, are facing difficulties with making themselves …
the past few years. These studies, however, are facing difficulties with making themselves …
Anomaly detection approach for urban sensing based on credibility and time-series analysis optimization model
H Zhang, Z Li - IEEE Access, 2019 - ieeexplore.ieee.org
Urban sensor networks often consist of a large number of low-cost sensor nodes. Due to the
constrained resource devices and hazardous deployment, urban sensing is vulnerable to …
constrained resource devices and hazardous deployment, urban sensing is vulnerable to …
A survey of cyber security approaches for prediction
H Liu, R Jiang, B Zhou, X Rong, J Li… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
This paper provides an overview of related prediction techniques used in the field of cyber
security, and discusses three main types of cyber security prediction tasks: projection and …
security, and discusses three main types of cyber security prediction tasks: projection and …