Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Applications of artificial intelligence and machine learning in smart cities

Z Ullah, F Al-Turjman, L Mostarda… - Computer Communications, 2020 - Elsevier
Smart cities are aimed to efficiently manage growing urbanization, energy consumption,
maintain a green environment, improve the economic and living standards of their citizens …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Internet of underwater things and big marine data analytics—a comprehensive survey

M Jahanbakht, W Xiang, L Hanzo… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Underwater Things (IoUT) is an emerging communication ecosystem
developed for connecting underwater objects in maritime and underwater environments …

Progress in outlier detection techniques: A survey

H Wang, MJ Bah, M Hammad - Ieee Access, 2019 - ieeexplore.ieee.org
Detecting outliers is a significant problem that has been studied in various research and
application areas. Researchers continue to design robust schemes to provide solutions to …

Artificial intelligence in cyber security: research advances, challenges, and opportunities

Z Zhang, H Ning, F Shi, F Farha, Y Xu, J Xu… - Artificial Intelligence …, 2022 - Springer
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …

A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges

J Xie, FR Yu, T Huang, R Xie, J Liu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
In recent years, with the rapid development of current Internet and mobile communication
technologies, the infrastructure, devices and resources in networking systems are becoming …

Performance analysis of machine learning algorithms in intrusion detection system: A review

T Saranya, S Sridevi, C Deisy, TD Chung… - Procedia Computer …, 2020 - Elsevier
The rapid growth of technologies not only formulates life easier but also exposes a lot of
security issues. With the advancement of the Internet over years, the number of attacks over …

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …