A Survey on the Applications of Semi-supervised Learning to Cyber-security

PK Mvula, P Branco, GV Jourdan, HL Viktor - ACM Computing Surveys, 2024 - dl.acm.org
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …

[HTML][HTML] Clustering based semi-supervised machine learning for DDoS attack classification

M Aamir, SMA Zaidi - Journal of King Saud University-Computer and …, 2021 - Elsevier
Semi-supervised machine learning can be used for obtaining subsets of unlabeled or
partially labeled dataset based on the applicable metrics of dissimilarity. At later stage, the …

A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning

PK Mvula, P Branco, GV Jourdan, HL Viktor - Discover Data, 2023 - Springer
Abstract In Machine Learning, the datasets used to build models are one of the main factors
limiting what these models can achieve and how good their predictive performance is …

Random partitioning forest for point-wise and collective anomaly detection—Application to network intrusion detection

PF Marteau - IEEE Transactions on Information Forensics and …, 2021 - ieeexplore.ieee.org
In this paper, we propose DiFF-RF, an ensemble approach composed of random partitioning
binary trees to detect point-wise and collective (as well as contextual) anomalies. Thanks to …

Su-ids: A semi-supervised and unsupervised framework for network intrusion detection

E Min, J Long, Q Liu, J Cui, Z Cai, J Ma - … 2018, Haikou, China, June 8–10 …, 2018 - Springer
Abstract Network Intrusion Detection Systems (NIDSs) are increasingly crucial due to the
expansion of computer networks. Detection techniques based on machine learning have …

[HTML][HTML] Semi-supervised multi-layered clustering model for intrusion detection

OY Al-Jarrah, Y Al-Hammdi, PD Yoo, S Muhaidat… - Digital Communications …, 2018 - Elsevier
Abstract A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS)
requires a large amount of labeled up-to-date training data to effectively detect intrusions …

Identifying shoplifting behaviors and inferring behavior intention based on human action detection and sequence analysis

S Kim, S Hwang, SH Hong - Advanced Engineering Informatics, 2021 - Elsevier
Identification of abnormal behaviors affecting public safety (eg, shoplifting, robbery, and
stealing) is essential for preventing human casualties and property damage. Many studies …

An improved method to detect arrhythmia using ensemble learning-based model in multi lead electrocardiogram (ECG)

S Mandala, A Rizal, Adiwijaya, S Nurmaini… - Plos one, 2024 - journals.plos.org
Arrhythmia is a life-threatening cardiac condition characterized by irregular heart rhythm.
Early and accurate detection is crucial for effective treatment. However, single-lead …

D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks

Y Meidan, D Benatar, R Bitton, D Avraham… - Computers & Security, 2023 - Elsevier
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …

Feature dynamic deep learning approach for DDoS mitigation within the ISP domain

I Ko, D Chambers, E Barrett - International Journal of Information Security, 2020 - Springer
The emergence of the Mirai malware facilitated a DDoS attack vector to surge to almost 1
Tbps in 2016, instigated by less than 150,000 infected IoT devices. With the infection of five …