FAIXID: A framework for enhancing AI explainability of intrusion detection results using data cleaning techniques

H Liu, C Zhong, A Alnusair, SR Islam - Journal of network and systems …, 2021 - Springer
Organizations depend on heavy use of various cyber defense technologies, including
intrusion detection and prevention systems, to monitor and protect networks and devices …

[图书][B] Reinforcement learning for cyber-physical systems: with cybersecurity case studies

C Li, M Qiu - 2019 - taylorfrancis.com
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …

Vulcon: A system for vulnerability prioritization, mitigation, and management

KA Farris, A Shah, G Cybenko, R Ganesan… - ACM Transactions on …, 2018 - dl.acm.org
Vulnerability remediation is a critical task in operational software and network security
management. In this article, an effective vulnerability management strategy, called VULCON …

When should shelf stocking be done at night? A workforce management optimization approach for retailers

R Muñoz, JC Muñoz, JC Ferrer, VI González… - Computers & Industrial …, 2024 - Elsevier
This research examines the economic viability of night shelf stocking in the retail industry. By
analyzing real data on the costs and benefits of both night and day stocking, we propose a …

A novel team formation framework based on performance in a cybersecurity operations center

A Shah, R Ganesan, S Jajodia, H Cam… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
A Cybersecurity Operations Center (CSOC) performs various tasks to protect an
organization from cyber threats. Several types of personnel collaborate to function effectively …

Network security technology of intelligent information terminal based on mobile internet of things

N Sun, T Li, G Song, H Xia - Mobile Information Systems, 2021 - Wiley Online Library
In the process of implementing the Internet of Things, the object itself has identity information
and identification equipment and encounters difficulties in communication security during …

[HTML][HTML] A sequential deep learning framework for a robust and resilient network intrusion detection system

S Hore, J Ghadermazi, A Shah, ND Bastian - Computers & Security, 2024 - Elsevier
Ensuring the security and integrity of computer and network systems is of utmost importance
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …

A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center

J Ghadermazi, A Shah, S Jajodia - Digital Threats: Research and …, 2024 - dl.acm.org
Cybersecurity operations centers (CSOCs) protect organizations by monitoring network
traffic and detecting suspicious activities in the form of alerts. The security response team …

Malware in the future? Forecasting of analyst detection of cyber events

JZ Bakdash, S Hutchinson, EG Zaroukian… - Journal of …, 2018 - academic.oup.com
Cyberattacks endanger physical, economic, social, and political security. There have been
extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate …

Research and challenges of reinforcement learning in cyber defense decision-making for intranet security

W Wang, D Sun, F Jiang, X Chen, C Zhu - Algorithms, 2022 - mdpi.com
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …