[HTML][HTML] Challenges and opportunities of generative models on tabular data

AX Wang, SS Chukova, CR Simpson, BP Nguyen - Applied Soft Computing, 2024 - Elsevier
Tabular data, organized like tables with rows and columns, is widely used. Existing models
for tabular data synthesis often face limitations related to data size or complexity. In contrast …

Exploring Innovative Approaches to Synthetic Tabular Data Generation

E Papadaki, AG Vrahatis, S Kotsiantis - Electronics, 2024 - mdpi.com
The rapid advancement of data generation techniques has spurred innovation across
multiple domains. This comprehensive review delves into the realm of data generation …

Trees Bootstrap Aggregation for Detection and Characterization of IoT-SCADA Network Traffic

LAC Ahakonye, CI Nwakanma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The accelerated industrial transformation has witnessed the supervisory control and data
acquisition (SCADA) transit from monolithic to the Internet of Things (IoT-SCADA). The …

Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks

N Briner, D Cullen, J Halladay, D Miller… - IEEE …, 2023 - ieeexplore.ieee.org
With the meteoric rise in anonymous network traffic data, there is a considerable need for
effective automation in traffic identification tasks. Though many shallow and deep machine …

Generation of Synthetic Data to Improve Security Monitoring for Cyber-Physical Production Systems

F Specht, J Otto, D Ratz - 2023 IEEE 21st International …, 2023 - ieeexplore.ieee.org
Machine learning based security monitoring can be used to detect cyberattacks and
malfunctions in cyber-physical production systems. Acquiring real data sets for training …

[PDF][PDF] Denial of Wallet: Analysis of a Looming Threat and Novel Solution for Mitigation using Image Classification

D Kelly, E Barrett, F Glavin - 2023 - aran.library.nuigalway.ie
Serverless Computing is a powerful cloud-based architecture for the creation of applications.
It boasts incredible scalability by running processes on a vast network of edge nodes. It …

DQN-based Adaptive Network Architecture for High-Fidelity NGN Flow Classification

APC Alvin, PM Mohan, PLK Keong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Next-generation networks (NGNs) are designed to handle the increasing demands of
modern communication, driven by a surge in data traffic and a wide array of applications …

CopulaGAN Boosted Random Forest based Network Intrusion Detection System for Hospital Network Infrastructure

M Nivedhidha, MP Ramkumar… - 2023 14th International …, 2023 - ieeexplore.ieee.org
The growing dependence on technology in healthcare has resulted in the creation of
sophisticated hospital networks that are highly linked and vulnerable to cyber threats. A …

Enhanced Dataset Synthesis Using CTGAN for Metagenomic Dataset

V Ince, M Bader-El-Den, OF Sari - 2024 IEEE 12th International …, 2024 - ieeexplore.ieee.org
The examination of bacterial communities has increasingly relied on machine learning
methods and metagenomic analysis, providing novel solutions across various domains …

Botnet Attack Detection in IoT Devices using Ensemble Classifiers with Reduced Feature Space

N Dharini, J Katiravan, SP Shakthi - International Research Journal …, 2024 - asianrepo.org
The Internet of Things (IoT) is an advancing important technology offers multiple perks, such
as webcams, baby monitors, room temperature controllers, smart security cameras and …