Machine learning for security applications under dynamic and adversarial environments

L Yang - 2023 - ideals.illinois.edu
The security community, including both academia and industry, is increasingly adopting
machine learning (ML) for its superior generalizability compared to traditional rule-based …

[PDF][PDF] Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model. Systems 2023, 11, 518

D Ramachandran, M Albathan, A Hussain, Q Abbas - 2023 - academia.edu
Developing a simple and efficient attack detection system for ensuring the security of cloud
systems against cyberthreats is a crucial and demanding process in the present time. In …

An Ensemble Framework for Network Anomaly Detection Using Isolation Forest and Autoencoders

G Maheswari, A Vinith… - … on Advances in Data …, 2024 - ieeexplore.ieee.org
In today's digitally interconnected world, securing computer networks against potential
threats is of utmost importance integrity and confidentiality of sensitive information are some …

Intelligent Detection System for Spoofing and Jamming Attacks in UAVs

KS Jasim, KM Ali Alheeti… - … , Cybercrimes, and Smart …, 2022 - Springer
Unmanned aerial vehicles (UAVs) have recently gained popularity due to their extensive
uses in parcel delivery, wildlife conservation, agriculture, and the military. However, security …

[图书][B] Learning Representations for Information-rich Graphs

Z Huang - 2023 - search.proquest.com
Graphs are powerful data structures that are used to model some of the most complex
systems in the world, such as interpersonal relationships in social networks, protein-protein …

Detección de DDoS e Intrusiones de red con ML en ambientes de nube

JN Bolaños Pertuz - 2023 - repositorio.uniandes.edu.co
Hoy en día vemos cómo las organizaciones migran progresivamente una proporción mayor
de sus servicios y procesos hacia la nube por las ventajas variadas de esta plataforma las …

Research on Intrusion Detection Method for Industrial Control Systems based on Improved APSO-MKBoost-C Algorithm

X Li, K Li - 2022 IEEE 24th Int Conf on High Performance …, 2022 - ieeexplore.ieee.org
The networking of industrial control systems improves the industrial production efficiency,
but it also suffers from the cyber attack risk. The distribution of intrusion data and normal data …

[PDF][PDF] Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets

B Lewandowski - 2023 - scitepress.org
Applying deep learning techniques to perform network intrusion detection has expanded
significantly in recent years. One of the main factors contributing to this expansion is the …

Network Intrusion Detection Method Based on Optimized Multiclass Support Vector Machine

Y Li, S Shang, N Wang, M Wang - International Symposium on Artificial …, 2022 - Springer
With the popularization of network applications and the great changes in the international
political, economic and military situations, network security is becoming more and more …

Role of YARA Tool in Intrusion Detection Systems (IDS)

RH Mahdi, H Trabelsi - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
Computer scientists are studying intrusion detection systems due to rising network
throughput and security threatsthat the network may be exposed to as a result of external …