A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

A review on guided-ultrasonic-wave-based structural health monitoring: From fundamental theory to machine learning techniques

Z Yang, H Yang, T Tian, D Deng, M Hu, J Ma, D Gao… - Ultrasonics, 2023 - Elsevier
The development of structural health monitoring (SHM) techniques is of great importance to
improve the structural efficiency and safety. With advantages of long propagation distances …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art

QV Pham, F Fang, VN Ha, MJ Piran, M Le, LB Le… - IEEE …, 2020 - ieeexplore.ieee.org
Driven by the emergence of new compute-intensive applications and the vision of the
Internet of Things (IoT), it is foreseen that the emerging 5G network will face an …

Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset

N Koroniotis, N Moustafa, E Sitnikova… - Future Generation …, 2019 - Elsevier
The proliferation of IoT systems, has seen them targeted by malicious third parties. To
address this challenge, realistic protection and investigation countermeasures, such as …

[HTML][HTML] A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges

J Xie, FR Yu, T Huang, R Xie, J Liu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
In recent years, with the rapid development of current Internet and mobile communication
technologies, the infrastructure, devices and resources in networking systems are becoming …

A very brief introduction to machine learning with applications to communication systems

O Simeone - IEEE Transactions on Cognitive Communications …, 2018 - ieeexplore.ieee.org
Given the unprecedented availability of data and computing resources, there is widespread
renewed interest in applying data-driven machine learning methods to problems for which …

Thirty years of machine learning: The road to Pareto-optimal wireless networks

J Wang, C Jiang, H Zhang, Y Ren… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Future wireless networks have a substantial potential in terms of supporting a broad range of
complex compelling applications both in military and civilian fields, where the users are able …

[HTML][HTML] A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …