A Survey on the Applications of Semi-supervised Learning to Cyber-security
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
[HTML][HTML] Clustering based semi-supervised machine learning for DDoS attack classification
M Aamir, SMA Zaidi - Journal of King Saud University-Computer and …, 2021 - Elsevier
Semi-supervised machine learning can be used for obtaining subsets of unlabeled or
partially labeled dataset based on the applicable metrics of dissimilarity. At later stage, the …
partially labeled dataset based on the applicable metrics of dissimilarity. At later stage, the …
A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning
Abstract In Machine Learning, the datasets used to build models are one of the main factors
limiting what these models can achieve and how good their predictive performance is …
limiting what these models can achieve and how good their predictive performance is …
Random partitioning forest for point-wise and collective anomaly detection—Application to network intrusion detection
PF Marteau - IEEE Transactions on Information Forensics and …, 2021 - ieeexplore.ieee.org
In this paper, we propose DiFF-RF, an ensemble approach composed of random partitioning
binary trees to detect point-wise and collective (as well as contextual) anomalies. Thanks to …
binary trees to detect point-wise and collective (as well as contextual) anomalies. Thanks to …
Su-ids: A semi-supervised and unsupervised framework for network intrusion detection
Abstract Network Intrusion Detection Systems (NIDSs) are increasingly crucial due to the
expansion of computer networks. Detection techniques based on machine learning have …
expansion of computer networks. Detection techniques based on machine learning have …
[HTML][HTML] Semi-supervised multi-layered clustering model for intrusion detection
Abstract A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS)
requires a large amount of labeled up-to-date training data to effectively detect intrusions …
requires a large amount of labeled up-to-date training data to effectively detect intrusions …
Identifying shoplifting behaviors and inferring behavior intention based on human action detection and sequence analysis
Identification of abnormal behaviors affecting public safety (eg, shoplifting, robbery, and
stealing) is essential for preventing human casualties and property damage. Many studies …
stealing) is essential for preventing human casualties and property damage. Many studies …
An improved method to detect arrhythmia using ensemble learning-based model in multi lead electrocardiogram (ECG)
Arrhythmia is a life-threatening cardiac condition characterized by irregular heart rhythm.
Early and accurate detection is crucial for effective treatment. However, single-lead …
Early and accurate detection is crucial for effective treatment. However, single-lead …
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
The emergence of the Mirai malware facilitated a DDoS attack vector to surge to almost 1
Tbps in 2016, instigated by less than 150,000 infected IoT devices. With the infection of five …
Tbps in 2016, instigated by less than 150,000 infected IoT devices. With the infection of five …