Big Data Analytics and Cybersecurity: Emerging Trends

S Aggarwal, S Sindakis - Big Data Analytics in Cognitive Social Media and …, 2021 - Springer
At the current digital age, cybercrimes are increasing vastly. The strategies and tools
preventing sophisticated cyberattacks and crimes cause organizations to stay intelligent with …

[PDF][PDF] Выявление сетевых аномалий в системных журналах операционной системы Microsoft Windows с использованием методов машинного обучения

АВ Павлычев, КС Солдатов, ВА Сказин - Доклады ТУСУР, 2021 - scholar.archive.org
Разработан алгоритм поиска и выявления сетевых аномалий в системных журналах
операционной системы Microsoft Windows с применением методов машинного …

The Future

FJ Furrer - Safety and Security of Cyber-Physical Systems …, 2022 - Springer
There is no doubt that cyber-physical systems will affect life, work, business, science, and
the environment more and more. Autonomy—based on artificial intelligence and machine …

[PDF][PDF] A MATHEMATICAL PROPOSED MODEL FOR PUBLIC KEY ENCRYPTION ALGORITHMS IN CYBERSECURITY

HA Saif, GMI Gharib, MR AL-Mousa - research-publication.com
Information security is a very important science, especially after the continuous increase in
cybercrime of all kinds, which caused very large financial, economic and political losses, so …

Cyber Security Intrusion Detection System Based on an Enhanced Gradient Boost Decision Trees with Cosine Kernel Support Vector Machine

A Poonguzhali, S Sivasubramanian, V Ramasamy… - papers.ssrn.com
Organizations that specialize in technological fields, such as cloud computing, big data,
Internet of thing (IoT), etc., are significantly troubled by the issue of cyber-attacks in present …

Comparative study of features selection methods: Case of denial of service attacks forecasting

K Bouzoubaa, Y Taher, B Nsiri - … of the 4th International Conference on …, 2020 - dl.acm.org
Today, and across the world, denial of service attacks has increased by a significant
frequency and takes different forms. The costs of downtime, outages and failures caused by …

Adversarial Attacks and Defenses against Deep Learning in Cybersecurity

B Gomathi, J Uma - Society 5.0 and the Future of Emerging …, 2022 - api.taylorfrancis.com
Adversarial attacks and defenses on cyber-physical systems is basically an AI (artifi cial
intelligence) technique that mimics the human mind, ie, the process of human thinking …

Fault Trees, Decision Trees, And Binary Decision Diagrams: A Systematic Comparison

LA Jimenez-Roa, T Heskes, M Stoelinga - arXiv preprint arXiv:2310.04448, 2023 - arxiv.org
In reliability engineering, we need to understand system dependencies, cause-effect
relations, identify critical components, and analyze how they trigger failures. Three …

تقييم الوعي بأمن المعلومات لدى العاملين في القطاع المصرفي الخاص في مصراتة–ليبيا

علي عبد الحفيظ الروياتي… - مجلة البحوث …, 2024‎ - lam-journal.ly
مادختسا متو، تامولعملا نمأب يعولا ةساردل عيزوت مت ثيح نايبتسلاا ةادأ فيظوت للاخ نم يمكلا
جهنملا 111 فظوم عيمج ىلع نايبتسا ي فراصملا ةعست ىلع نايبتسلاا لمتشا، ةفدهتسملا أ …

Uso de algoritmos de machine learning para la detección de archivos malware

S Sanz García - 2022 - e-spacio.uned.es
El siguiente proyecto de investigación aborda los problemas surgidos con el avance
tecnológico y las consecuencias que ello provoca en la ciberseguridad. Con futuras …