[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva Papers on …, 2022 - Springer
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International Journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems.

R Alkanhel, DS Khafaga… - Computers …, 2023 - search.ebscohost.com
Abstract The Internet of Things (IoT) is a modern approach that enables connection with a
wide variety of devices remotely. Due to the resource constraints and open nature of IoT …

GAN augmentation to deal with imbalance in imaging-based intrusion detection

G Andresini, A Appice, L De Rose, D Malerba - Future Generation …, 2021 - Elsevier
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber
defenders' ability to write new attack signatures. This paper illustrates a deep learning …

[HTML][HTML] Time series forecasting of COVID-19 transmission in Asia Pacific countries using deep neural networks

HT Rauf, MIU Lali, MA Khan, S Kadry… - Personal and Ubiquitous …, 2023 - Springer
The novel human coronavirus disease COVID-19 has become the fifth documented
pandemic since the 1918 flu pandemic. COVID-19 was first reported in Wuhan, China, and …

Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers

NV Sharma, NS Yadav - Microprocessors and Microsystems, 2021 - Elsevier
With the rapid growth and advancement in technology, we are becoming more and more
dependent on the internet for our day-to-day work. As a result of this, we have become an …

[HTML][HTML] Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods

K Samunnisa, GSV Kumar, K Madhavi - Measurement: Sensors, 2023 - Elsevier
Cloud Computing is popular nowadays due to its storage and data access services. Security
and privacy are prime concerns when network threats increase. Cloud computing offers …

An integrated framework for COVID‐19 classification based on classical and quantum transfer learning from a chest radiograph

MJ Umer, J Amin, M Sharif, MA Anjum… - Concurrency and …, 2022 - Wiley Online Library
COVID‐19 is a quickly spreading over 10 million persons globally. The overall number of
infected patients worldwide is estimated to be around 133,381,413 people. Infection rate is …

Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC

EK Boahen, BE Bouya-Moko, C Wang - Computers & Security, 2021 - Elsevier
Network anomalies detection is a complementary technology for systems that detect security
threats in networks based on package signatures. Controlled network environments have …