Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
Applications of artificial intelligence and machine learning in smart cities
Smart cities are aimed to efficiently manage growing urbanization, energy consumption,
maintain a green environment, improve the economic and living standards of their citizens …
maintain a green environment, improve the economic and living standards of their citizens …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Internet of underwater things and big marine data analytics—a comprehensive survey
The Internet of Underwater Things (IoUT) is an emerging communication ecosystem
developed for connecting underwater objects in maritime and underwater environments …
developed for connecting underwater objects in maritime and underwater environments …
Progress in outlier detection techniques: A survey
Detecting outliers is a significant problem that has been studied in various research and
application areas. Researchers continue to design robust schemes to provide solutions to …
application areas. Researchers continue to design robust schemes to provide solutions to …
Artificial intelligence in cyber security: research advances, challenges, and opportunities
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …
a broad range of cyber security applications. Therefore, this paper surveys the existing …
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …
security applications. A short tutorial-style description of each DL method is provided …
A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges
In recent years, with the rapid development of current Internet and mobile communication
technologies, the infrastructure, devices and resources in networking systems are becoming …
technologies, the infrastructure, devices and resources in networking systems are becoming …
Performance analysis of machine learning algorithms in intrusion detection system: A review
The rapid growth of technologies not only formulates life easier but also exposes a lot of
security issues. With the advancement of the Internet over years, the number of attacks over …
security issues. With the advancement of the Internet over years, the number of attacks over …
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …
Such methods focus on two major areas: detection of intrusions at the network level using …