A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

[PDF][PDF] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023 - gjeta.com
In the current technological environment, different entities engage in intricate cyber security
approaches in order to counter damages and disruptions in web-based systems. The design …

Empirical analysis of data streaming and batch learning models for network intrusion detection

KS Adewole, TT Salau-Ibrahim, AL Imoize, ID Oladipo… - Electronics, 2022 - mdpi.com
Network intrusion, such as denial of service, probing attacks, and phishing, comprises some
of the complex threats that have put the online community at risk. The increase in the …

Towards multi-view android malware detection through image-based deep learning

J Geremias, EK Viegas, AO Santin… - 2022 International …, 2022 - ieeexplore.ieee.org
Over the last years, several works have proposed highly accurate Android malware
detection techniques. Surprisingly, modern malware apps can still pave their way to official …

A Novel Unsupervised Outlier Detection Algorithm Based on Mutual Information and Reduced Spectral Clustering

Y Huang, W Liu, S Li, Y Guo, W Chen - Electronics, 2023 - mdpi.com
Outlier detection is an essential research field in data mining, especially in the areas of
network security, credit card fraud detection, industrial flaw detection, etc. The existing outlier …

Achieving verifiable decision tree prediction on hybrid blockchains

M Fu, C Zhang, C Hu, T Wu, J Dong, L Zhu - Entropy, 2023 - mdpi.com
Machine learning has become increasingly popular in academic and industrial communities
and has been widely implemented in various online applications due to its powerful ability to …

Causal effect analysis-based intrusion detection system for IoT applications

S Bhaskara, SS Rathore - International Journal of Information Security, 2023 - Springer
Intrusion detection systems (IDSs) are employed at various levels in the network to either
detect or prevent an intrusion that could cause irrecoverable data damage in IoT …

Network anomaly detection via similarity-aware ensemble learning with ADSim

W Chen, Z Wang, L Chang, K Wang, Y Zhong, D Han… - Computer Networks, 2024 - Elsevier
The last decade has seen the increasing application of machine learning to various tasks,
including network anomaly detection. But anomaly detection methods based on a single …

Towards a reliable and lightweight onboard fault detection in autonomous unmanned aerial vehicles

SS Katta, EK Viegas - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
This paper proposes a new model for onboard physical fault detection on autonomous
unmanned aerial vehicles (UAV) through machine learning (ML) techniques. The proposal …

A stream learning intrusion detection system for concept drifting network traffic

P Horchulhack, EK Viegas… - 2022 6th Cyber Security in …, 2022 - ieeexplore.ieee.org
Network-based intrusion detection is a widely explored topic in the literature. Yet, despite the
promising reported results, designed schemes are rarely used in production environments …