A comprehensive survey of clustering algorithms: State-of-the-art machine learning applications, taxonomy, challenges, and future research prospects
AE Ezugwu, AM Ikotun, OO Oyelade… - … Applications of Artificial …, 2022 - Elsevier
Clustering is an essential tool in data mining research and applications. It is the subject of
active research in many fields of study, such as computer science, data science, statistics …
active research in many fields of study, such as computer science, data science, statistics …
A deep learning framework for predicting cyber attacks rates
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …
threats can never be overestimated. Previous investigations show that cyber attack data …
Modeling multivariate cybersecurity risks
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
Detection of HTTP-GET flood attack based on analysis of page access behavior
T Yatagai, T Isohara, I Sasase - 2007 IEEE Pacific rim …, 2007 - ieeexplore.ieee.org
Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …
A vine copula model for predicting the effectiveness of cyber defense early-warning
abstract Internet-based computer information systems play critical roles in many aspects of
modern society. However, these systems are constantly under cyber attacks that can cause …
modern society. However, these systems are constantly under cyber attacks that can cause …
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables
Analyzing network traffic data to detect suspicious network activities (ie, intrusions) requires
tremendous effort due to the variability of the data and constant changes in network traffic …
tremendous effort due to the variability of the data and constant changes in network traffic …
[HTML][HTML] ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach
PK Kishore, S Ramamoorthy… - International Journal of …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the most destructive internet
network attacks, denying legitimate users access to resources and networks by maliciously …
network attacks, denying legitimate users access to resources and networks by maliciously …
Intrusion prediction systems
In recent years, cyberattacks have increased rapidly in huge volumes and diversity. Despite
the existence of advanced cyber-defence systems, attacks and intrusions still occur. Defence …
the existence of advanced cyber-defence systems, attacks and intrusions still occur. Defence …
Hidden-Markov-model-enabled prediction and visualization of cyber agility in IoT era
Cyberthreats are continually evolving and growing in numbers and extreme complexities
with the increasing connectivity of the Internet of Things (IoT). Existing cyber-defense tools …
with the increasing connectivity of the Internet of Things (IoT). Existing cyber-defense tools …